API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents - 2015

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research from 2015.

User notifications for interaction information

A content management system creates and modifies user notification queues for shared content items synchronized between a content management system and multiple devices. A user notification queue includes interactions with a shared content item that may be presented to a user to indicate recent interactions with the shared content item by other sharing users. The content management system sends the user notification queue corresponding to a user to the user's device when the user accesses the content item. The client device displays a content item in a window associated with a process on the device. A client application displays an interaction indicator that presents user notification queue content to the user.

  • Pub Date: 2015/31/12
  • Number: 09413708
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and devices with different radio link failure timers based on user equipment speed

Systems, methods, and device for adjusting an operation time of a radio link failure timer are disclosed herein. User equipment (UE) may be configured to communicatively couple to an evolved Universal Terrestrial Radio Access Network (E-UTRAN). The UE use different radio link failure timer parameters depending on the speed of the UE. The radio link failure timer may run for a longer time for rapidly moving UEs and run for a shorter time for slowly moving UEs. In an embodiment, the UE may scale the radio link failure timer by a scaling factor. In another embodiment, the UE may include multiple radio link failure timers for different speeds. The radio link failure timer parameters for each speed may be specified by the E-UTRAN in a one-to-one communication. The E-UTRAN may determine which parameters to use for each UE based on characteristics of the UE.

  • Pub Date: 2015/31/12
  • Number: 09420627
  • Owner: INTEL IP CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Scan chain latch design that improves testability of integrated circuits

A scan chain latch circuit, a method of operating a latch circuit in a scan chain, and a computer-readable medium having stored thereon a data structure defining a scan chain latch circuit for instantiation on a semiconductor die are disclosed. In an embodiment, the scan chain latch circuit comprises a first latch for holding one data value, a second latch for holding another data value, and a multiplexor. The one data value is applied to a first data input of the multiplexor and the another data value is applied to a second data input of the multiplexor. An alternating clock signal is applied to a select input of the multiplexor to control the output of the multiplexor, wherein the output of the multiplexor toggles between the two data values held in the two latches at a defined frequency.

  • Pub Date: 2015/31/12
  • Number: 09372231
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Remote alarm hushing with acoustic presence verification

Embodiments of the present disclosure provide methods and systems for enabling remote alarm hushing with acoustic presence verification. Acoustic presence verification is used to assure that a device attempting to remotely deactivate an alarm is located within a certain distance of an alarming device before allowing the alarm to be hushed. Acoustic presence can be established through emission and monitoring of ultrasonic acoustic signals. The ultrasonic acoustic signals may be transmitted at a frequency that exceeds human hearing such as, for example, between 18 kHz and 22 kHz. Such ultrasonic signals have a relatively short range and are unable to penetrate walls and floors, thus providing an effective tool for ensuring that the device attempting to remotely hush an alarming device is within a line-of-sight of the alarming device.

  • Pub Date: 2015/31/12
  • Number: 09640061
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mountable, thermal situational-awareness accessory for use with optical devices

A situational-awareness accessory comprises a housing including a control board, a user display, and a visual sensor for receiving electromagnetic radiation that is invisible to the human eye from a wide-angle, optical field-of-view in front of the visual sensor. The control board converts the received electromagnetic radiation into visual display data and initiates display of the visual display data on the user display. A quick-detach accessory base mount coupled with the housing permits attachment of the housing to an accessory rail.

  • Pub Date: 2015/31/12
  • Number: 09602730
  • Owner: Torrey Pines Logic, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Mapping and formatting input commands to a third party protocol

A method and apparatus of translating and mapping received commands between operating system languages and/or protocol-based languages. One example method may provide receiving an action initiated by an external source, such as a person or automated action selection operation. The method may also include identifying the action as a predetermined command of a first computer operating language stored in a memory and mapping the predetermined command to a corresponding protocol command of a different computer operating language, and executing the corresponding protocol command after the mapping operation.

  • Pub Date: 2015/31/12
  • Number: 09342286
  • Owner: AMX, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Toll-tree numbers metadata tagging and analysis

A toll-free tagging service is provided that includes a subscription-based service that is made available to responsible organizations, consumers and businesses. The toll-free tagging service may provide the ability to tag a toll-free number (or group of numbers), and once a number is tagged, to track updates to that number that may then be distributed to customers through emails/text messages or other means. Subscribers of the toll-free tagging service may also have the ability to create, view, update and delete tags through a web application, mobile application, or some other user interface.

  • Pub Date: 2015/30/12
  • Number: 09571666
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Routing tree enhancements based on real time performance statistics

A call path score that utilizes real time network statistics, sourced from carriers and the public domain that may be provided to LCR and SCPs to determine the net “value” of a route such that, depending on customer choice, a call completion pattern may be created. Calls may be completed optimizing distance, quality or cost based on real time network and carrier database. This function may be further enhanced to provide a customer sourced rating score that enhances call routing. This may be utilized for real time carrier performance statistics to analyze network congestion. Multiple carriers may be assigned based on network performance and carrier congestion.

  • Pub Date: 2015/30/12
  • Number: 09531886
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Predictive toll-free number search

A method of searching for a toll-free number including identifying a previous search number history for a user; and offering a toll free number associated with the previous search number history to the user.

  • Pub Date: 2015/30/12
  • Number: 09571667
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


One-click search, reservation, and activation of toll-free telecommunications numbers

A method of receiving a one-click activation request from a user, including searching and reserving toll-free numbers in a “One-Click” manner and providing users with the ability to create a standard toll-free service in the interim with number forwarding.

  • Pub Date: 2015/30/12
  • Number: 09635191
  • Owner: Somos, Inc.
  • Location: Bridgewater, US
  • Details: Visit USPTO

Visit USPTO Page


Native mobile device identification for toll-free service usage

A mobile device including a unique toll-free ID (TFID) present in the mobile device operable to facilitate toll-free communication between the mobile device and a manufacturer.

  • Pub Date: 2015/30/12
  • Number: 09654648
  • Owner: Somos, Inc.
  • Location: Bridgewater, US
  • Details: Visit USPTO

Visit USPTO Page


Modified forms of exotoxin A

exotoxin A or “PE” is a 66kD, highly potent, cytotoxic protein secreted by the bacterium . Various forms of PE have been coupled to other proteins, such as antibodies, to generate therapeutically useful cytotoxin conjugates that selectively target cells of a desired phenotype (such as tumor cells). In the present invention, peptides spanning the sequence of an approximately 38kD form of exotoxin A protein were analyzed for the presence of immunogenic CD4+ T cell epitopes. Six immunogenic T cell epitopes were identified. Residues were identified within each epitope for introduction of targeted amino acid substitutions to reduce or prevent immunogenic T-cell responses in PE molecules which may be administered to a heterologous host.

  • Pub Date: 2015/30/12
  • Number: 09447387
  • Owner: INTREXON CORPORATION
  • Location: Blacksburg, US
  • Details: Visit USPTO

Visit USPTO Page


Macroeconomic and predictive analytics based on toll-free number utilization

A predictive analytics model, that provides for overlaying indexing techniques and enriching the data with public domain and customer sentiment data to provide representation of a macroeconomic trend. Analysis of toll-free telecommunications data, such as call volume data to toll-free numbers owned by key federal agencies, month over month, may be used to develop an indicator of economic events, trends and correlates.

  • Pub Date: 2015/30/12
  • Number: 09654649
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Facial recognition using fractal features

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for facial recognition using fractal features are disclosed. In one aspect, a method includes the actions of accessing data encoding a facial image, the facial image including a face. The actions further include generating a hierarchical graphical model of the face in the facial image, the hierarchical graphical model including more than nodes from at least one level, each level approximating the face within a contour. The actions further include applying a bank of filters to the face at a particular node, each filter spanning more than one scale and at least one direction. The actions further include analyzing filter responses from the bank of filters applied at each direction to obtain a similarity measure that consolidates filter responses from filters applied at more than one scale. The actions further include generating a vector representation.

  • Pub Date: 2015/30/12
  • Number: 09652664
  • Owner: MorphoTrust USA, LLC
  • Location: Billerica, US
  • Details: Visit USPTO

Visit USPTO Page


Client device using a markup language to control a periphery device via a point-of-sale printer

A device control system has a terminal with an application , and a printer that controls a device. The terminal sends a request written in XML generated by the application . The printer receives the XML request, the terminal sends an XML response, and if the terminal requested control of the device in the XML request, controls the device.

  • Pub Date: 2015/30/12
  • Number: 09495121
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and process for producing porous devices

In general, in various embodiments, the present disclosure is directed systems and methods for producing a porous surface from a solid piece of polymer. In particular, the present disclosure is directed to systems that include a track assembly, mold assembly, press assembly, and methods for using the same for producing a porous surface from a solid piece of polymer. In some embodiments, the present systems and methods are directed to processing a polymer at a temperature below a melting point of the polymer to produce a solid piece of polymer with an integrated a porous surface.

  • Pub Date: 2015/30/12
  • Number: 09517593
  • Owner: VERTERA, INC.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Using inverse operators for queries on online social networks

In one embodiment, a method includes receiving, from a client device of a first user of an online social network, a structured query comprising references to one or more selected objects associated with the online social network, parsing the structured query to identify a first query constraint and one or more second query constraints, identifying an inverse constraint associated with the first query constraint, wherein the first query constraint has been previously flagged as identifying greater than a threshold number of objects, and generating a query command based on the structured query, wherein the query command comprises the inverse constraint and the one or more second query constraints.

  • Pub Date: 2015/29/12
  • Number: 09495354
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automatically measuring the dimensions of and identifying the type of exterior siding

Methods, systems, and computer readable media are disclosed for determining a pixel-to-length ratio between a number of pixels disposed over a predetermined length of a reference object within an image of a siding sample and the predetermined length of the reference object. A first and second distance between respective first and second pairs of points within the image corresponding to respective first and second length measurements of the siding sample are determined, as well as a first and second number of pixels disposed between the first and second pair of points, respectively. Furthermore, the method, system, and computer readable medium disclose determining the first length measurement based on the pixel-to-length ratio and the first number of pixels, determining the second length measurement based on the pixel-to-length ratio and the second number of pixels, and identifying a siding product associated with the first and second length measurements.

  • Pub Date: 2015/29/12
  • Number: 09536301
  • Owner: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
  • Location: Bloomington, US
  • Details: Visit USPTO

Visit USPTO Page


Security co-processor boot performance

Technologies for improving platform initialization on a computing device include beginning initialization of a platform of the computing device using a basic input/output system (BIOS) of the computing device. A security co-processor driver module adds a security co-processor command to a command list when a security processor command is received from the BIOS module. The computing device establishes a periodic interrupt of the initialization of the platform to query the security co-processor regarding the availability of a response to a previously submitted security co-processor command, forward any responses received by the security co-processor driver module to the BIOS module, and submit the next security co-processor command in the command list to the security co-processor.

  • Pub Date: 2015/29/12
  • Number: 09563775
  • Owner: intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Secure over-the-air provisioning solution for handheld and desktop devices and services

In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to obtain a unique identification (ID) of the device at the provisioning system. The device and provisioning system then participate in device and user authentication in response to a confirmed unique ID by a backend access control system, where the device generates a secure key pair after successful user authentication. In response to the device being approved for services (e.g., checked by the provisioning system via a registration system), the provisioning system provides a root certificate to the device, and the device sends a certificate enrollment request back to the provisioning system. In response to a certificate authority signing the certificate request, the provisioning system returns a valid certificate to the device, and the valid certificate is installed on the device.

  • Pub Date: 2015/29/12
  • Number: 09450951
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Search query interactions on online social networks

In one embodiment, a method includes receiving, from a client system of a first user of an online social network, a structured query comprising references to one or more selected objects associated with the online social network, generating a query command based on the structured query, wherein the query command comprises an inner query constraint and an outer query constraint, identifying a first set of objects matching the inner query constraint and at least in part matching the outer query constraint, identifying a second set of objects matching the outer query constraint, and generating one or more search results based on the first and second sets of objects, wherein each search result corresponds to an object of the plurality of objects.

  • Pub Date: 2015/29/12
  • Number: 09471692
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Search intent for queries on online social networks

In one embodiment, a method includes receiving, from a client system of a first user, a structured query comprising references to one or more selected objects accessible by the computing device, generating one or more search results corresponding to the structured query, wherein each search result corresponds to a particular object accessible by the computing device, determining one or more search intents based at least on whether one or more of the selected objects referenced in the structured query match objects corresponding to a search intent indexed in a pattern-detection model, and scoring the search results based on one or more of the search intents.

  • Pub Date: 2015/29/12
  • Number: 09483803
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Replacing virtual machine disks

At least one target virtual disk descriptor that describes at least one virtual disk associated with an existing target virtual machine in a target virtualized environment is merged with at least one source virtual disk descriptor that describes at least one virtual disk associated with a source. The merging is carried out to obtain at least one merged virtual disk descriptor compatible with the target virtualized environment. The at least one virtual disk associated with the existing target virtual machine in the target virtualized environment is replaced with the at least one virtual disk associated with the source, in accordance with the at least one merged virtual disk descriptor.

  • Pub Date: 2015/29/12
  • Number: 09632814
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing application-level denial-of-service in a multi-tenant system using parametric-sensitive transaction weighting

Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor “usage profiles” are generated. Typically, a profile comprises information, such as one or more “constraints,” and one or more “actions.” At least one constraint is generated by applying one or more parameters of a transaction weighting function such that the resulting constraint represents an actual or estimated cost of executing the transaction. An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, the approach prevents over-utilization of compute resources.

  • Pub Date: 2015/29/12
  • Number: 09548991
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Lost and found system for personal items

A system for facilitating the recovery of a user's lost item is provided that makes use of tags the user applies to the item and an interactive voice response (IVR) system. When a finder of the item calls a phone number displayed on the tag, the finder is directed to the IVR system. The finder is prompted to identify the item by providing a unique code displayed on the tag. Once the finder provides the unique code, a server in the system receives the phone number and unique code from the IVR system and verifies if there is a user associated with the tag. If so, the server sends a response back to the IVR system to obtain the finder's message indicating the location of the item. After the finder leaves a message, the message is transmitted automatically to the user in real time.

  • Pub Date: 2015/29/12
  • Number: 09569950
  • Owner: EIDTAG, LLC
  • Location: Redondo Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Asynchronous submission of commands

A system and method for allocating commands in processing is disclosed. The system and method includes an application running on a computer system that provides commands to be executed on one of a plurality of processors capable of executing the commands, the commands provided through an application programming interface, a device driver that buffers the streamed commands and converts the streamed commands into a format used by a GPU, and an operating system that builds a command buffer by grouping a plurality of converted commands based on an allocation for an available processor, wherein the available processor is determined in the interface between the device driver and the operating system. The available processor is one of the plurality of processors capable of executing the commands that receives the command buffer from the operating system, queues the command buffer and performs an asynchronous submission of the command buffer to the GPU, and the GPU executes the command buffer.

  • Pub Date: 2015/29/12
  • Number: 09632848
  • Owner: ADVANCED MICRO DEVICES, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for dynamically adjusting batch request sizes

The disclosed computer-implemented method for dynamically adjusting batch request sizes may include (1) identifying a storage system that accepts batched requests for data stored within the storage system, (2) measuring the latency for at least one request sent to the storage system to retrieve a portion of the data stored within the storage system, (3) adjusting, based on the latency of the request, a batch size for the batched requests sent to the storage system, and (4) sending a batched request of the adjusted batched size to the storage system. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2015/28/12
  • Number: 09626120
  • Owner: Veritas Technologies
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for taking action with respect to an electronic media work

Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.

  • Pub Date: 2015/28/12
  • Number: 09558190
  • Owner: NETWORK-1 TECHNOLOGIES, INC.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for accessing an enterprise resource planning system via a mobile device

A method and apparatus for accessing an enterprise resource planning system via a mobile device is described. In one embodiment, the method includes parsing data from a host application access application into at least one object in an application-specific format, converting the data into an intermediate format that is compatible with a mobile device and communicating the converted data to the mobile device.

  • Pub Date: 2015/28/12
  • Number: 09420054
  • Owner: SYNACTIVE, INC.
  • Location: Foster City, US
  • Details: Visit USPTO

Visit USPTO Page


Content orchestration for assembly of customized content streams

There is provided a content orchestration system and a method for use by the content orchestration system to enable assembly of one or more customized content streams. In one implementation, such a content orchestration system includes a computing platform having a processor, and a content orchestration engine for execution by the processor. The content orchestration engine is configured to receive data describing multiple content sources capable of providing content for use in assembling a customized content stream. The content orchestration engine is also configured to identify customization guidelines corresponding to a destination of the customized content stream, and to determine instructions for assembling the customized content stream based on the data and the customization guidelines.

  • Pub Date: 2015/28/12
  • Number: 09503770
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


Communications system for residents of secure facility

A system and a method are provide for two-way communications, automated request handling, and push notifications, via SMS, MMS, IM, email, and other electronic messaging systems, between (1) residents confined to a secure facility, such as a jail or a prison, and (2) persons located outside the secure facility who have friendly or family relationships with the confined residents.

  • Pub Date: 2015/28/12
  • Number: 09516030
  • Owner: Intelmate LLC
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


High speed, high current pulsed driver circuit

Various technologies presented herein relate to driving a LED such that the LED emits short duration pulses of light. This is accomplished by driving the LED with short duration, high amplitude current pulses. When the LED is driven by short duration, high amplitude current pulses, the LED emits light at a greater amplitude compared to when the LED is driven by continuous wave current.

  • Pub Date: 2015/24/12
  • Number: 09603210
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Treating renal cancer with a whole, leech saliva extract

Methods are provided for isolating and using a whole-saliva leech extract. The methods can include feeding a phagostimulatory agent to a leech; inducing a regurgitation in the leech, the inducing including placing the leech in an environment having a temperature of less than about 0° C.; and, collecting an unrefined, whole saliva in the regurgitation of the cooled leech. The methods can include revitalizing the leech by warming it at a temperature ranging from about 5° C. to about 40° C. Stable, lyophilized, whole-saliva extracts of a leech are also provided, the extract having a stable activity when stored for use at a temperature below about −20° C., the extract maintaining at least 70% of the activity for at least 6 months. The extracts can be used to treat solid tumors, treat liquid tumors, treat diabetes, treat a viral disease, treat a parasitic disease, treat an antibacterial disease, or serve as an anti-oxidant.

  • Pub Date: 2015/23/12
  • Number: 09433648
  • Owner: BIOPEP SOLUTIONS, INC.
  • Location: Richmond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of generating and using a bitmap index

Systems and methods of generating and using a bitmap index are disclosed. The bitmap index stores bit strings. In a particular implementation, each bit string in the bitmap index corresponds to an attribute of an audience. Each location in each bit string corresponds to the same audience member. The bitmap index supports parallelized and distributed execution of queries with respect to data indexed by the bitmap index. For example, the described bitmap index can be used to index advertising data, healthcare data, financial data, etc.

  • Pub Date: 2015/23/12
  • Number: 09436718
  • Owner: UMBEL CORPORATION
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless device with application data flow tagging and network stack-implemented network access policy

A wireless end-user device has WWAN and WLAN modems. A memory stores a WWAN network access policy specific to data traffic usage and/or attempted usage by a first software application but not a second software application. An application service interface agent identifies network data traffic flows with respective tag information that associates a responsible one of a plurality of software applications with each identified network data traffic flow. One or more elements of a network stack then use the tag information to identify a network data traffic flow associated with the first software application, the one or more elements applying the network access policy to the identified network data traffic flow.

  • Pub Date: 2015/22/12
  • Number: 09532161
  • Owner: Headwater Partners I LLC
  • Location: Tyler, US
  • Details: Visit USPTO

Visit USPTO Page


Web document annotation service

Annotating web content, in one aspect, may include detecting a request to navigate to a web site for content on a web browser. A component such as a web browser plugin, extension or the like transmits a uniform resource locator (URL) associated with the web site to a computer-implemented service that stores annotations to the content separate from the web site that is providing the content, and receives from the computer-implemented service one or more annotations to the content. The web browser plugin or the like renders the one or more annotations within the content from the web site. The content rendered with the annotations may be displayed within a display window of the web browser.

  • Pub Date: 2015/22/12
  • Number: 09519632
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Manipulation of beads in droplets and methods for manipulating droplets

The invention provides a method of circulating magnetically responsive beads within a droplet in a droplet actuator. The invention also provides methods for splitting droplets. The invention, in one embodiment, makes use of a droplet actuator with top and bottom substrates, a plurality of magnetic fields respectively present proximate the top and bottom substrates, wherein at least one of the magnet fields is selectively alterable, and a plurality of droplet operations electrodes positioned along at least one of the top and bottom surfaces. A droplet is positioned between the top and bottom surfaces and at least one of the magnetic fields is selectively altered.

  • Pub Date: 2015/22/12
  • Number: 09494498
  • Owner: Advanced Liquid Logic, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System having in-memory buffer service, temporary events file storage system and events file uploader service

Computer-implemented methods and systems are provided for writing events to a data store. An application server generates events, the data store that stores the events, and a temporary events file storage system (TEFSS) temporarily stores groups of events as events files. When events are unable to be written directly to the data store, an indirect events writer is invoked that includes event capture threads each being configured to generate a particular events file, and write it to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service. An events file uploader service reads the events file(s) from the TEFSS, and then writes the events from each of the events files to the data store.

  • Pub Date: 2015/21/12
  • Number: 09632849
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System having in-memory buffer service, temporary events file storage system and backup events file uploader service

Computer-implemented methods and systems are provided. The system includes a data store that is configured to store events in an event table, a temporary events file storage system (TEFSS), and a cluster of application servers. The cluster includes a first application server that generates events, and a second application server that includes an events file uploader service. When the first application server is unable to directly write events to the data store, an indirect events writer generates events file(s), and writes the events file(s) to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service at the first application server. When the events file uploader service determines that the first application server is inactive, it reads the events file(s) from the TEFSS, and writes the events from each of the events files to the data store.

  • Pub Date: 2015/21/12
  • Number: 09658801
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing contactless payment with a near field communications attachment

A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable of connecting the attachment to an audio jack on a mobile device. Further, a system and method in accordance with exemplary embodiments may include receiving a payment initiation instruction from a customer, using a near field communication antenna, sending payment information to a point of sale device, using one or more computer processors, encoding data related to the payment as audio data, and transmitting the data related to the payment through an audio jack.

  • Pub Date: 2015/21/12
  • Number: 09489672
  • Owner: CAPITAL ONE FINANCIAL CORPORATION
  • Location: McLean, US
  • Details: Visit USPTO

Visit USPTO Page


Heuristic electronic monitoring security device association

The present invention includes a security-monitoring platform adapted to automatically create associations between electronic monitoring security devices and security alerts on the fly. As alerts occur, the security-monitoring platform operator may select one or more electronic monitoring security devices to aid in processing the security alert, and the security-monitoring platform automatically identifies the selected electronic monitoring security device(s) and creates an association between the selected electronic monitoring security device(s) and the security alert. The security-monitoring platform will then automatically display the associated electronic monitoring security device to the operator when that same security alert is subsequently triggered.

  • Pub Date: 2015/21/12
  • Number: 09652974
  • Owner: Sureview Systems, LLC
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware resource accessing systems and methods for accessing hardware resources in browser-based operating systems and machine-readable storage medium thereof

Methods for accessing hardware resources in an electronic device with a browser-based operating system (OS) which includes a user interface running in a browser are provided. A local server is first provided on the electronic device, wherein the local server has a corresponding URL and a dedicated network port. Then, upon receiving a service request from the client-side web application, the local server analyzes a service type of the service request and performs an operation to at least one of the hardware resources corresponding to the service type, wherein the service request is generated and directed to the local server according to the URL and the dedicated network port of the local server by the client-side web application on the electronic device.

  • Pub Date: 2015/21/12
  • Number: 09420040
  • Owner: VIA TECHNOLOGIES, INC.
  • Location: New Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Efficient delivery of content by virtualization of dynamic interaction with the document object model

A method of updating a document object model (DOM) is disclosed. A request by a web browser for information to update the DOM is intercepted by intercepting an interaction with the DOM. The request is converted to a server request as part of a client-server protocol, requesting at least a portion of the information from a server. The server request is sent to the server. A first server response including at least a portion of the information from the server is received. The first server response is processed according to the client-server protocol to determine a first update to the DOM. The first update is applied to the DOM.

  • Pub Date: 2015/21/12
  • Number: 09450803
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic semantic models having multiple indices

Embodiments are directed towards dynamic semantic models having multiple indices. Source data may be provided to a network computer from at least one separate data source. A raw data graph may be generated from the source data such that the structure of the raw data graph may be based on the structure of the source data. Elements of the raw data graph may be mapped to a concept graph. Concept instances may be generated based on the concept graph, the raw data graph, and the source data. Model-identifiers (MIDs) that correspond to the concept instances may be generated to include at least a path in the concept graph The MID values may be indexed into a plurality of indices based on a content-type of the data associated with the MIDs. In response to a query, a result set may be generated that includes result MIDs.

  • Pub Date: 2015/21/12
  • Number: 09501578
  • Owner: Maana, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Drive control apparatus that drives actuator, electronic apparatus that drives actuator, and control method for driving actuator

A drive control apparatus includes a storage configured to store waveform data representing a drive signal constituted of a sine wave satisfying a frequency f=(m/n)×f (m and n are mutually different positive odd numbers), the drive signal applying vibration (m/2)×Q times (Q is a natural number other than 0) to an actuator, the f representing a resonant frequency of the actuator, and a drive controller configured to read the waveform data stored in the storage, and output the drive signal corresponding to the read waveform data to the actuator.

  • Pub Date: 2015/21/12
  • Number: 09606628
  • Owner: FUJITSU LIMITED
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Control device with passive reflector

A control device includes a housing. The control device also includes a wireless communicator interior the housing. The wireless communicator wirelessly sends commands for controlling an electronic device, such as a game console. The control device also includes a reflector positioned to reflect light directed at the housing.

  • Pub Date: 2015/21/12
  • Number: 09524554
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Application programming interfaces for data parallel computing on multiple processors

A method and an apparatus for a parallel computing program calling APIs (application programming interfaces) in a host processor to perform a data processing task in parallel among compute units are described. The compute units are coupled to the host processor including central processing units (CPUs) and graphic processing units (GPUs). A program object corresponding to a source code for the data processing task is generated in a memory coupled to the host processor according to the API calls. Executable codes for the compute units are generated from the program object according to the API calls to be loaded for concurrent execution among the compute units to perform the data processing task.

  • Pub Date: 2015/21/12
  • Number: 09477525
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Auto-grouping of application windows

Described herein are techniques for automatically forming groups of application windows. The techniques may be performed with a computing device executing a windowing system, the windowing system having a user interface element that can be interacted with by a user to manage applications executing on the computing device. Each application may correspond to a separate process and application window. It may be determined that an operation has occurred that will evict the application windows of target applications from the display, and in response an application group may be automatically formed. The application group may have indicia of the evicted target applications. The application group may be provided to the user interface element, and when the user interface element is interacted with by the user the user interface element displays user-selectable graphic application indicators for both the application group and applications other than the target applications.

  • Pub Date: 2015/19/12
  • Number: 09575643
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to confirm replication data accuracy for data backup in data storage systems

A data storage system, according to certain aspects, automatically determines the accuracy of replication data when performing data backup operations. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. The system automatically determines the accuracy of replication data during data backup.

  • Pub Date: 2015/18/12
  • Number: 09619339
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing an application configuration among social networks

A machine may generate and store a correlation among multiple identifiers of the user that enable access to an application through multiple systems. For example, the user may have a first identifier for using a first social network system, and a second identifier for using a second social network system, and the machine may generate and store a correlation between the first identifier and the second identifier. The machine may identify the user based on the first identifier and access a database that stores the correlation. The machine may then access a configuration of the application based on the correlation and configure the application in accordance with the configuration. The machine may generate a visual representation of the configured application, provide the visual representation to a device of a further user, receive an indication of an opinion of the further user on the visual representation, and present the indication.

  • Pub Date: 2015/18/12
  • Number: 09426212
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Pluggable extension of software applications

Various embodiments of systems and methods to provide pluggable extensions of software applications are provided herein. In one aspect, plugin application package is received for deployment. The plugin application package includes configuration data to comprising various definitions for the deployment of the plugin application. In another aspect, configuration data of a host software application is updated with at least a part of the configuration data of the plugin application. The host application is reconfigured based on the updated host configuration data to refer to the plugin application. In yet another aspect, one or more plugin services provided by the plugin application are exposed through the reconfigured host application, to handle corresponding user requests.

  • Pub Date: 2015/18/12
  • Number: 09652214
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for collecting and disseminating information over a computer network

The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.

  • Pub Date: 2015/18/12
  • Number: 09390151
  • Owner: mBLAST, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Streamlined system to restore an analytic model state for training and scoring

A computing device restores a state of an analytic model. A first indicator of a dataset is received. A second indicator is received of an analytic model state file in which a state of an analytic model is stored. A reentry point name of a function to restore the analytic model is extracted from the state stored in the analytic model state file indicated by the received second indicator. The function is called using the extracted reentry point name to restore the state of the analytic model. The dataset indicated by the received first indicator is scored using the restored state of the analytic model. Scoring results from the scored dataset are written to an output file.

  • Pub Date: 2015/17/12
  • Number: 09619491
  • Owner: SAS Institute Inc.
  • Location: Cary, US
  • Details: Visit USPTO

Visit USPTO Page


Social static ranking for search

In one embodiment, one or more computing devices receive, from a client device of a first user, a query from the first user. The computer devices search a social graph to identify one or more nodes of the social graph that are relevant to the query. The computer devices obtain a static rank for each identified node. The static rank is based at least in part on a number of edges of a particular edge type that are connected to the node in the graph or attributes of edges connected to the node in the graph. The computer devices send to the client device of the first user for display, a search-results page responsive to the received query. The search-results page includes reference to one or more nodes having a static rank greater than a threshold rank.

  • Pub Date: 2015/17/12
  • Number: 09514196
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Metadata brokering server and methods

Exemplary embodiments of the present invention provide methods and systems for supplying rich multimedia metadata usable to generate, e.g., sophisticated entertainment user interfaces in the home. These methods and systems can be implemented as a server-based software application that feeds multiple, diverse clients. The server functionality could be distributed, even co-located physically with one or more clients, or centralized. The server aggregates, filters, validates, augments and links metadata from disparate sources. The server transforms the metadata into a more manageable and extensible internal format. The server communicates with client devices using a schema-independent protocol, providing metadata in the appropriate format that suites the clients needs.

  • Pub Date: 2015/17/12
  • Number: 09503769
  • Owner: HILLCREST LABORATORIES, INC.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based VoIP functions in a wireless network

A wireless network can include one or more nodes distributed throughout a physical environment. The locations of client devices within the wireless network can be determined based on observing measurements of wireless signals exchanged between the nodes and the client devices. In some example embodiments, the capability of determining location information of client devices more accurately can be utilized for enhancing Voice over Internet Protocol (VoIP) functions. In an example embodiment, a phone call can be intelligently routed to where the user is located within the wireless network. In another example embodiment, more accurate location information can be provided to emergency response personnel in the event of an emergency. In another example embodiment, the volume of a VoIP-enabled client device can be adjusted depending on the proximity of other users.

  • Pub Date: 2015/17/12
  • Number: 09642167
  • Owner: CISCO TECHNOLOGY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Integrating offsite activities related to chat and text messaging with online data records

Various systems and associated methods for tracking chats, text messages, and other user interactions. The process generates at least one identifier, distributes at least one identifier to at least one system, uses the at least one identifier to associate interactions with network-based content across different entities, whereby at least one interaction is anonymous. The method involves receiving a request sent to a database stored on a computer readable medium in response to online activity and any collected or known user information, creating a record thereof in response to the request, generating an identifier associated therewith, generating a code corresponding thereto, and using the identifier to associate an incoming text message, chat, resulting financial transactions, follow-on activities, etc. with associated online activity and user information. The association happens through remote communication with a system that receives and sends the incoming text message or chat requests.

  • Pub Date: 2015/17/12
  • Number: 09491249
  • Details: Visit USPTO

Visit USPTO Page


Integrated development environment for heterogeneous client/server environments

The present disclosure describes methods, systems, and computer program products providing an integrated development environment for client/server environments. One computer-implemented method includes reading a derived business application data model (BADM) associated with a business application into an integrated development environment (IDE), defining a client application data model (CADM) for a client application, defining at least one data mapping rule (DMR) to map at least data translations between the BADM and the CADM, developing the client application based upon at least the CADM, developing at least one web service based upon the BADM, CADM, and the at least one DMR, generating the client application and the at least one web service, and deploying the client application, the at least one web service, and the at least one DMR.

  • Pub Date: 2015/17/12
  • Number: 09557970
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Generating comprehensive symbol tables for source code files

A computer-implemented method includes identifying a primary symbol table associated with a primary source code file and identifying a secondary symbol table associated with a secondary source code file. The computer-implemented further includes receiving a source code association indication. The source code association indication includes at least one association relationship between the primary source code file and the secondary source code file. The computer-implemented further includes creating a comprehensive symbol table. The comprehensive symbol table comprises contents of the primary symbol table and contents of the secondary symbol table. A corresponding computer program product and computer system are also disclosed.

  • Pub Date: 2015/17/12
  • Number: 09389837
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Exercise apparatus

An exercise apparatus comprising a foot support movable by the user on the frame back and forth through any one of a plurality of complete, reproducible and different arc segments of a master arcuate path, the foot support being interconnected to an arc segment selection device that is manually actuatable to enable the user to manually select any one of the plurality of different arc segments.

  • Pub Date: 2015/17/12
  • Number: 09457224
  • Owner: Cybex International, Inc.
  • Location: Medway, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed metering and monitoring system

The distributed metering and monitoring service (DMMS) system provides a way to gather and maintain metrics data which remains distributed, until requested. The DMMS system uses messaging queues to scale the number of servers that may be monitored and metered to a hyperscale of greater than 10,000 servers. The DMMS system determines how many servers (nodes) to assign to a cluster, and uses a metric aggregator to collect and store metrics data for the nodes. The DMMS system creates message queues for the instances, injects instance identifiers into the cluster state data and metrics data, listens for request messages for metering information for instances, retrieves the metrics data for users identified by the instance identifiers stored locally at the nodes, and calculates the metering information for the instance.

  • Pub Date: 2015/17/12
  • Number: 09432462
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Read-write non-erasable memory with laser recording and method of recording

A nonvolatile memory comprising at least one ferromagnetic region having permeability which changes from a first state to a second state of lower permeability upon heating; at least one laser operatively associated with the at least one ferromagnetic region which selectively provides heat to the ferromagnetic region to change its p permeability; and a plurality of connectors operatively connected to the at least one laser and adapted to be connected to a current source that provides a current which causes the laser to change the at least one ferromagnetic region from a first state to a second state. Optionally, the memory is arranged as an array of memory cells. Optionally, each cell has a magnetic field sensor operatively associated therewith. Optionally, the nonvolatile memory is radiation hard. Also, a method of recording data by heating at least one ferromagnetic region to change its permeability.

  • Pub Date: 2015/16/12
  • Number: 09552832
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Process of protecting metal substrates with corrosion-resistant compositions

This invention relates to galvanic aluminum alloy powder-pigments coated with semi-conducting corrosion-inhibiting compositions and particularly to the process for preparing said coated powder-pigments for coating substrates to inhibit corrosion. The coated aluminum alloy powder-pigments are electrically active and prevent corrosion of metals which are more cathodic (electropositive) than the coated-aluminum alloy pigments.

  • Pub Date: 2015/16/12
  • Number: 09534120
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


On demand apparel manufacturing

Aspects of on demand apparel manufacturing are described. A system of on demand apparel manufacturing includes a textile printer, textile cutter, and a computing device. The computing device is configured to perform a process including aggregating orders for products, organizing the orders according to a productivity factor, and arranging panels for products in the orders into an aggregated textile panel template. Arranging the panels can include aligning the panels among each other to reduce scrap in a textile sheet or orienting the panels with a thread, weave, nap, or knit pattern in the textile sheet, for example. The process can further include instructing the textile printer to print a plurality of panels for the products on the textile sheet based on the aggregated textile panel template, and instructing the textile cutter to cut the plurality of panels out from the textile sheet.

  • Pub Date: 2015/16/12
  • Number: 09623578
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Modular device payment system

A modular device payment module includes a chassis. A modular device connector is located on the chassis. A payment module database in the chassis stores funding source information and security information. A payment module engine in the chassis determines that the modular device connector has been connected to a modular device frame of a modular device, and retrieves modular device identifying information from the modular device. The payment module then determines that the modular device identifying information matches an authorized modular device identified by the security information in the payment module database and, in response, enables the transmission of at least some of the funding source information from the payment module database to conduct a payment transaction.

  • Pub Date: 2015/16/12
  • Number: 09552580
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and managing applications using any number of different platforms

At least one application is received from a user. The at least one application is stored on a communication platform. A catalog is received. The catalog includes at least one service. Each service of the at least one service is associated with a platform. An indication of a selection, from the user, is received. The selection comprises a first service associated with a first platform, and a second service associated with a second platform. The first service stores the at least one application from the user. The second service runs the at least one application from the user. Responsive to receiving the indication, the at least one application is deployed to the indicated first platform. Additionally, responsive to receiving the indication, a service bridge from the communication platform to the second platform is deployed. The at least one application is run, on the first platform utilizing the service bridge.

  • Pub Date: 2015/16/12
  • Number: 09606794
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable medium for schedule-based telecommunication policies

A system, method and computer-readable medium for enforcing user telecommunication privileges on a per-schedule basis are provided. Enterprise members may have a schedule associated therewith that defines scheduled locations of the users. Telecommunication service privileges may be coordinated with the users' schedules such that communication services are disabled at particular times based on the users' schedules. In other implementations, particular users may have telecommunication services disabled by an administrator in the event of a catastrophe or emergency. By this mechanism, users that are not proximate to a particular catastrophe or emergency area according to the users' schedule may have services disabled while other users that are located more proximate to the emergency may have their telecommunication services enabled. In this manner, the demand on a cellular network may be alleviated thereby increasing the likelihood that users directly impacted by the emergency may receive and place calls or access data services.

  • Pub Date: 2015/15/12
  • Number: 09413884
  • Owner: Tango Networks, Inc.
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Network control of applications using application states

Application states of applications associated with a communication device can be network controlled. An application agent, associated with an application used by the communication device, controls transitioning the application between application states based on network indicators received or network events detected from a communication network. The application states include active state or doze state. An application management component associated with the communication network at least partially controls transitioning the application between application states to facilitate controlling network traffic or reducing network congestion. The application agent or application management component can map application states to various factors, including radio states, congestion level, application performance indicators, network policies, or user policies, to facilitate determining which application state to apply to an application at a given time. The application agent can be in a centralized location, or at a same or different location as the application source.

  • Pub Date: 2015/15/12
  • Number: 09420400
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and using temporal metadata partitions

Concepts and technologies are disclosed herein for generating and using temporal metadata partitions. Metadata can be stored in temporal metadata partitions based upon a time range included in the metadata. Furthermore, metadata can be stored in multiple temporal metadata partitions to which the metadata is relevant. As such, metadata can be stored in manner that allows event data to be understood in the context of temporally accurate and/or relevant metadata. Functionality for executing queries of event data and providing results in view of metadata, as well as the merging of multiple temporal metadata partitions also are disclosed.

  • Pub Date: 2015/15/12
  • Number: 09633079
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Facilitation of delay error correction in timing-based location systems

Computation of delay error offset information is facilitated. A method can include receiving measurement information indicative of a location of a mobile device, calibrating the measurement information resulting in calibrated measurement information, comparing the calibrated measurement information and historical calibrated measurement information, and computing a measurement error based, at least, on the comparing, wherein the measurement error includes delay error offset information.

  • Pub Date: 2015/15/12
  • Number: 09591495
  • Owner: AT&T MOBILITY II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically defined virtual private network tunnels in hybrid cloud environments

A plurality of virtual private network (VPN) tunnels between a first cloud and a second cloud in a hybrid cloud environment are managed by a VPN Manager. A request including a first set of requirements is received from a first cloud application resident in the first cloud for a first VPN tunnel. The request is sent to a system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN Manager receives an event pertaining to the first VPN tunnel. In response to the event, the VPN Manager sends a modification request to the first system containing a second set of requirements. The first system tunes the first VPN tunnel according to a second set of requirements.

  • Pub Date: 2015/15/12
  • Number: 09571457
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications management

Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, upon identifying an available wireless network, a determination may be made as to whether the available wireless network comprises an authorized wireless network. In response to determining that the available wireless network comprises the authorized wireless network, a connection may be established with the available wireless network and at least one data communication may be performed via the available wireless network instead of a second network.

  • Pub Date: 2015/15/12
  • Number: 09585016
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Content based recommendation system

A media control system enables a device-agnostic and source-agnostic entertainment experience through use of an internet-enabled user device. The user device includes a client application for navigating through media or entertainment content, controlling media devices according to a type of media content selected by the user, and sharing media experiences via social networks. The user device includes smartphones, tablet computers, and other internet-enabled processor-based devices. The media control system leverages the internet access of the user device to enable search and discovery of all available media content. A recommendation engine coupled to the client application learns media preferences from user behavior, generates from numerous disparate media sources recommended media choices corresponding to the media preferences, and presents the recommended media choices on the user device.

  • Pub Date: 2015/15/12
  • Number: 09542649
  • Owner: Peel Technologies, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Asset management service for distributed computing environments

Concepts and technologies are disclosed herein for an asset management service. The asset management service can receive asset record creation requests and can store asset records at an asset data repository. The asset records can identify assets and associated information such as, for example, asset identifiers, personnel, organizations, users, geographic locations, time and date information, status information, or the like. A user device can execute an asset management application to generate asset tags including the asset identifiers and to scan existing asset tags. When asset tags are scanned, the user device also can capture device and/or user information that can be used to set a status or provide available status choices. Status updates can be provided to the asset management service for updating of the asset records.

  • Pub Date: 2015/15/12
  • Number: 09454746
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatuses, methods and systems for a social networking application updater

The apparatuses, methods and systems for application update includes determining a module dependency graph for a current version of the application, when an indication to generate an updated version of the application is received. A code database is queried to obtain all version numbers for dependent modules identified in the module dependency graph. Recent versions of all dependent modules are selected for an updated version of the application to generate an initial set of dependent modules for the application. Specification attributes for the recent version of the dependent modules are obtained and verified to determine if they are compatible with the updated version of the application. When it is determined that a specific dependent module is not compatible, a different version number for the specific dependent module is selected and the initial set is modified by replacing the recent version with the different version number to generate a modified set. The verification is performed iteratively till all dependent modules are compatible with the updated version of the application. The updated version is compiled using the modified set. The compiling results in transferring a user from the current version to the updated version while the user is using the application.

  • Pub Date: 2015/15/12
  • Number: 09400645
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Using behavioral data in rating user reputation

In a system and method for using user behavior and interaction data to rate a reputation of a user, a processor-implemented tracking component tracks an interaction of a user with a network-based publisher. A processor-implemented reputation component generates a reputation value for the user from the tracked user interaction.

  • Pub Date: 2015/14/12
  • Number: 09595052
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, apparatus, and methods for generating prediction sets based on a known set of features

An individual having a plurality of first features and a second characteristic is identified. A plurality of second features associated with a second characteristic is determined. For each first feature among the plurality of first features, a respective probability distribution indicating, for each respective second feature, a probability that a person having the respective second feature has the first feature, is determined, thereby generating a plurality of probability distributions. A probabilistic classifier is used to combine the plurality of probability distributions, thereby generating a merged probability distribution. A Monte Carlo method is used to generate a prediction set based on the merged probability distribution, the prediction set including a plurality of prediction values for the second characteristic of the individual, each respective prediction value being associated with one of the plurality of second features. The prediction set is stored in a memory. The probabilistic classifier may include a Naïve-Bayes method. Prediction sets may be generated for each of a plurality of individuals, and used to predict a feature associated with a group. For example, an advertisement may be selected and displayed based on the predicted feature.

  • Pub Date: 2015/14/12
  • Number: 09524469
  • Owner: Metrostar Systems, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of providing a user with a registration review in IMS system

Disclosed are a network-based device, method and computer-readable medium for operating an IP Multimedia Subsystem (IMS) to provide registration review. The method embodiment includes tracking and storing all current registrations for each user in an IMS system, receiving a request from a user for a status of the user's current registrations and presenting, in response to the request, the current status of current registrations for the user.

  • Pub Date: 2015/14/12
  • Number: 09467964
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Servlet API and method for XMPP protocol

A communication system and method include a server hosting an interactive voice response or self-help application in a virtual machine. In order to leverage the advantages and facilities of the servlet model, a XMPP (Extensible Messaging and Presence Protocol) servlet container is provided for the server so that the communication application can be programmed with objects defined by an XMPP servlet API, as well as such as HTTP and SIP servlets, in order to service an XMPP client. In addition to the generic class objects of the Java servlet model, the API also provides a set of XMPP-specific class objects. The XMPP servlet container includes a network point at a transport level for handling network connections, an XMPP service layer for managing XMPP sessions and streams, and an application layer for managing XMPP stanzas.

  • Pub Date: 2015/14/12
  • Number: 09479400
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Pre-coding in multi-user MIMO

In a multi-user communication system, a pre-coder in a transmitter comprises a Discrete Fourier Transform (DFT) spreader configured to spread reference-signal symbols with Fourier coefficients to generate DFT-spread reference symbols. An OFDM modulator, such as an inverse-DFT, modulates the DFT-spread reference symbols onto OFDM subcarriers to produce a pre-coded OFDM transmission signal.

  • Pub Date: 2015/14/12
  • Number: 09485063
  • Owner: Genghiscomm Holdings, LLC
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Planar waveguide based cartridges and associated methods for detecting target analyte

A cartridge for processing a sample includes (a) a planar waveguide with upper and lower planar surfaces defining an optical axis therebetween, wherein the upper planar surface has a plurality of capture molecules bound thereto, (b) a lens portion, coupled to the planar waveguide, for focusing and refracting a light beam propagating parallel to, but offset from, the optical axis such that the light beam couples into the planar waveguide and propagates therein along the optical axis at a non-zero, internal propagation angle β relative to the upper planar surface, and (c) a sample chamber for positioning the sample in contact with the plurality of capture molecules such that a target analyte of the sample is detectable through (i) an assay involving the target analyte and the capture molecules and (ii) evanescent illumination of the assay using the light beam within the planar waveguide.

  • Pub Date: 2015/14/12
  • Number: 09658222
  • Owner: Mbio Diagnostics, Inc.
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel optimized remote synchronization of active block storage

Updating a second cluster server that backs up a first cluster server includes retrieving a first metadata file from a first cluster server. The first metadata file includes a first ordered list of block identifiers for data blocks stored on a first plurality of block servers. The updating also includes retrieving a second metadata file from a second cluster server. The second metadata file includes a second ordered list of block identifiers for data blocks stored on a second plurality of block servers. The updating also includes comparing the first metadata file to the second metadata file to determine a difference list. The difference list includes block identifiers from the first ordered list that differ from block identifiers of the second ordered list. The updating also includes sending, to the first cluster server, a request for data blocks associated with the block identifiers from the difference list.

  • Pub Date: 2015/14/12
  • Number: 09613046
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Modified delta-sigma modulator for phase coherent frequency synthesis applications

A phase coherent fractional-N phase-locked loop synthesizer for maintaining phase coherence of a synthesized frequency includes a phase coherent delta-sigma modulator (DSM) having a plurality of feed-forward accumulator stages. The DSM is operatively coupled to a reference clock configured to generate a cyclical reference signal. The DSM configured to count a number of cycles of the reference signal, to cause, at each cycle of the reference signal, each of the stages of the DSM to accumulate a sum of a previous stage of the DSM, and to multiply each sum by a fractional divide word to produce a multiplier output, thereby causing the DSM to output a sequence of signals that tracks with the reference clock.

  • Pub Date: 2015/14/12
  • Number: 09479185
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Message transmission for distributed computing systems

A message from a source computer that includes message information indicating a destination target computer system to receive the message, is received. The received message in a storage component, is stored. An entry to a virtual queue for the received message, wherein the entry in the virtual queue points to a memory address of the received message that is stored in the message component, is created. Responsive to determining that the destination target computer system is available, the received message to a physical queue component and assigning an expiration condition to the received message is enqueued. The enqueued message to the destination target computer system is transmitted. Responsive to determining that the expiration condition for the received message is met, the received message from the physical queue is removed.

  • Pub Date: 2015/14/12
  • Number: 09509641
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Information management of data associated with multiple cloud services

A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.

  • Pub Date: 2015/14/12
  • Number: 09571579
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Database cost tracing and analysis

Web services hosted at a data center may employ architectural patterns that tend to obfuscate the source of queries made against databases and other resources in the data center. The queries may be the source of performance, capacity or utilization problems, and may contribute to the cost of hosting the web service. Web service invocations may be associated with identifiers that can be included in modified queries sent to databases and other resources. Summarized cost information may be calculated based on recorded associations between the identifiers and query performance information.

  • Pub Date: 2015/14/12
  • Number: 09613080
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures

The disclosure is generally directed to methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures and their applications on mobile, embedded, and other computing devices and applications.

  • Pub Date: 2015/13/12
  • Number: 09595294
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for videoconferencing input and display management based on activity

Systems and methods of managing a videoconference viewed by a first camera coupled to a first display are provided, including, for a face not detected by the first camera and a second camera coupled to a second display in a user environment, performing an action based on off-display analysis; for a face direction less head-on in the first camera than in the second camera, switching the videoconference to the second camera; and for the face direction not detectable in the first camera, and on-display user activity at the second display, switching the videoconference to the second camera.

  • Pub Date: 2015/11/12
  • Number: 09491374
  • Owner: FUJI XEROX CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Optimizing latest user defined class loader

A computer-implemented method for class load optimizing. The method identifies a class in which a context can be determined at a compile time, using a compiler. The method determines whether a caller method within the class has a specific signature call using the context of the class. The method determines a callee method within the class using the context of the class. The method determines whether the callee method's receiver is a first argument of the caller method. Furthermore, the method retrieves a class object of the class and converts the callee method to a second method, in response to the caller method having the specific signature, the callee method being of the specific signature and callee method being the first argument of the caller method.

  • Pub Date: 2015/11/12
  • Number: 09471341
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for remote voice-over or music production and management

A desktop application and supporting web site for capturing audio and video recordings is introduced, wherein multiple participants in a collaborative session may be in separate remote locations. The application includes providing a high quality data format for transferring recordings, audiovisual data and the like to a remote network location or computer and a real-time data format for intercommunicating comments and instructions that are not recorded. Peer-to-peer and server-client implementations may be optimized regarding delivery time versus take quality. The desktop application also provides mechanisms for playing back sound and video for participants' reference during a recording, along with synchronized presentations of textual, audio and visual material corresponding to the session.

  • Pub Date: 2015/11/12
  • Number: 09635312
  • Owner: SOUNDSTREAK, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Gun alignment technique

A method is provided for aligning a gun barrel. The method includes disposing a signal transmitter at the barrel's muzzle, distributing sensors around the barrel to receive the muzzle's signal, calculating the muzzle's coordinate position based on the signal, aiming an electro-optical sensor at a target to determine a miss distance, and calibrating the gun barrel based on the electro-optical sensor based on the miss distance.

  • Pub Date: 2015/11/12
  • Number: 09574851
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Exposing proprietary data to a hypervisor as native hypervisor data

Exposing proprietary data to a hypervisor as native hypervisor data. In one example embodiment, one or more non-transitory computer-readable media store one or more programs that are configured, when executed, to cause one or more processors to perform a method of exposing proprietary data to a hypervisor as native hypervisor data. The method may include identifying a proprietary disk file having a proprietary file format, identifying a plugin file corresponding to the proprietary disk file with the plugin file having a plugin file format which is different from a native hypervisor disk file format, and intercepting read requests directed to the plugin file. The method may further include, in response to each read request, gathering data gathered from the proprietary disk file, restructuring the data to cause the data to appear to be gathered from a native hypervisor disk file, and responding with the restructured data.

  • Pub Date: 2015/11/12
  • Number: 09489140
  • Owner: STORAGECRAFT TECHNOLOGY CORPORATION
  • Location: Draper, US
  • Details: Visit USPTO

Visit USPTO Page


Event stream processing device providing real-time incident identification

A computing device to perform incident identification on streamed event data is provided. An event block object is received. The event block object includes a measurement data value generated by a sensor. A plurality of measurement data values and associated time values are extracted for the plurality of event block objects that occur during a time window. A similarity measure is computed between the measurement data values and each of a plurality of reference incident signatures. A best matching reference incident signature is selected from the similarity measures. The similarity measure for the selected best matching reference incident signature is compared to a threshold value. When the selected similarity measure satisfies the threshold value, a type of incident for the extracted measurement data values is identified as a type of incident defined for the selected best matching reference incident signature and is output to an incident information subscribing device.

  • Pub Date: 2015/11/12
  • Number: 09432430
  • Owner: SAS Institute Inc.
  • Location: Cary, US
  • Details: Visit USPTO

Visit USPTO Page


Securing group communications

The secure messaging app described herein allows a user to create a secure social feed in order to share content with just a few friends or thousands of recipients. The user encrypts their content and then publishes the encrypted content to the secure social feed. Accordingly, only authorized recipients can decrypt and view the content. Furthermore, the user may administer the secure social feed to manage the addition and/or removal of users from the secure social feed. Further, the user periodically updates the parameters of the secure social feed to manage users' access to the feed.

  • Pub Date: 2015/10/12
  • Number: 09654288
  • Owner: Wickr Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Health checking a question answering cognitive computing system built on a baseline of ground truth virtual checksum

A mechanism is provided in a data processing system for performing a health check on a question answering system instance. The mechanism embeds a ground truth virtual checksum in a shared library accessible by the question answering system instance. The question answering system instance is trained using the ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a test question, an answer to the test question, and a confidence level range for the answer to the test question. Responsive to a health check monitor triggering a health check servlet executing on the question answering system instance, the health check servlet submits a test question from the ground truth virtual checksum to the question answering system instance and receives a result answer and a result confidence value. Responsive to the health check servlet determining the result answer and the result confidence value match the ground truth virtual checksum, the health check servlet notifies the health check monitor that the question answering system instance is functional.

  • Pub Date: 2015/10/12
  • Number: 09471877
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic gaze correction for video conferencing

Systems and techniques to dynamically correct a gaze of participants in a video conference are described. A computing device participating in a video conference may determine that a frame of a video stream includes features of a face, extract a portion of the frame that includes a first pair of eyes, and determine that the first pair of eyes are looking in a non-forward direction. The computing device may retrieve, from a database, a stored portion that includes a second pair of eyes that are looking in a forward direction, and modify the frame by substituting the stored portion for the portion in the frame to create a modified frame. The computing device may send the modified frame to a videoconferencing server for distribution to other computing devices participating in the video conference.

  • Pub Date: 2015/10/12
  • Number: 09538130
  • Owner: Dell Software, Inc.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud-based server computing system for and method of providing cross-platform remote access to 3D graphics applications

A server computing system in a client-server computing environment includes a virtual display driver that marshals and transmits graphics application programming interface (API) functions to a client via a network. The server may receive capability information from the client, allowing the virtual display driver to resolve differences between the APIs supported on the server and the client.

  • Pub Date: 2015/10/12
  • Number: 09467534
  • Owner: hopTo Inc.
  • Location: Campbell, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing conferencing in a distributed communication network

Systems and methods for a conferencing system. Responsive to a new conference request received at a conference orchestration service, participants of the conference and participant regions for each determined participant are determined. A mixer topology is generated that specifies an assignment of each determined participant to at least one input channel of a plurality of mixers. A mixer state manager generates the mixer topology based on the determined participant regions and at least one regional association of a mixer. Media of each determined participant is routed to the assigned at least one input channel according to the generated mixer topology by using the conference orchestration service. The mixer state manager generates the topology responsive to a request provided by the conference state manager. The conference orchestration service receives the generated mixer topology from the mixer state manager via the conference state manager.

  • Pub Date: 2015/09/12
  • Number: 09553900
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method for communicating data between an NFC-enabled device on a vehicle and a driver indentification device

A method for communicating data between a vehicle and a mobile computing device includes locating at least one NFC-enabled device on the vehicle. Vehicle user data is wirelessly transferred between the NFC-enabled device and the mobile computing device. Using the vehicle user data, the NFC-enabled device on the vehicle and the mobile computing device are paired.

  • Pub Date: 2015/09/12
  • Number: 09604508
  • Owner: iTIRE, LLC
  • Location: Rock Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for magnetic stripe reading using mobile magnetometers

In various example embodiments, a system and method for reading magnetic information by a mobile device are presented. In example embodiments, the mobile device comprises a housing having an integrated surface for swiping a magnetic swipe card and a magnetometer, positioned within the housing, for detecting direction and strength of magnetic fields to read magnetic information from a variety of sources and to produce digital magnetometer output signals. The digital magnetometer output signals represent magnetic information derived from the magnetic swipe card and from the Earth's magnetic fields (or other sources). Each of the digital magnetometer output signals having a magnitude related to the strength of the detected magnetic fields. The mobile device determines at least some of the digital magnetometer output signals represent the magnetic information derived from the magnetic swipe card and provides that information to a magnetic card application for processing. The mobile device determine at least some of the digital magnetometer output signals represent the magnetic information derived from the Earth's magnetic fields and provides that information to a compass application for processing.

  • Pub Date: 2015/09/12
  • Number: 09589219
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Light data integration

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a light integration. One of the methods includes receiving a plurality of objects from a functional logic tier of an application, each object representative of data stored in a data tier of the application, a first portion of the stored data being stored in a first persistent data store and a second portion of the stored data being stored in a second persistent data store. The method includes presenting in a first area of the user interface information from the plurality of objects, the information selected from the first portion of the data. The method includes receiving an indication of an object being selected from the plurality of objects. The method includes presenting in a second area of the user interface information from the second part of data corresponding to the selected business object.

  • Pub Date: 2015/09/12
  • Number: 09613108
  • Owner: Vinyl Development LLC
  • Location: Miami Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Credential management

A credential management system is described that provides a way to disable and/or rotate credentials, such as when a credential is suspected to have been compromised, while minimizing potential impact to various systems that may depend on such credentials. The credentials may be disabled temporarily at first and the availability of various resources is monitored for changes. If no significant drop of availability in the resources has occurred, the credential may be disabled for a longer period of time. In this manner, the credentials may be disabled and re-enabled for increasingly longer time intervals until it is determined with sufficient confidence/certainty that disabling the credential will not adversely impact critical systems, at which point the credential can be rotated and/or permanently disabled. This process also enables the system to determine which systems are affected by a credential in cases where such information is not known.

  • Pub Date: 2015/09/12
  • Number: 09544292
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system using a direct current signal of a distributed resource modulated by an alternating current signal

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject a direct current (DC) signal from the controllable voltage source converter of at least one DC voltage distributed resource into the distribution system and modulating an alternating current (AC) signal on top of the direct current (DC) signal.

  • Pub Date: 2015/08/12
  • Number: 09389269
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one wind turbine distributed resource

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a wind turbine.

  • Pub Date: 2015/08/12
  • Number: 09389267
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one solar panel distributed resource

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a solar panel.

  • Pub Date: 2015/08/12
  • Number: 09417278
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one microturbine distributed resource

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a microturbine.

  • Pub Date: 2015/08/12
  • Number: 09389266
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one distributed resource having a controllable voltage source converter

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources comprises a controllable voltage source converter.

  • Pub Date: 2015/08/12
  • Number: 09459308
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one DC voltage distributed resource having a controllable voltage source converter

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a DC voltage distributed resource comprising a controllable voltage source converter.

  • Pub Date: 2015/08/12
  • Number: 09389268
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System for locating a fault in a power distribution system comprising at least one cogeneration distributed resource

The present invention provides a system to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a cogeneration distributed resource.

  • Pub Date: 2015/08/12
  • Number: 09429615
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for real-time analysis of network traffic

A mirrored live-data flow of the live-data flow passing through a selected point within a network is monitored at a first processing node. The live-data flow comprises data that is in active transmission between endpoints in the network and prior to exit from the network and onward storage of the data in a database. Each packet within the mirrored data flow is decoded at the first processing node according to each protocol associated with a packet. Packets having a plurality of protocols associated therewith are decoded in parallel with each other. Each of the decoded packets are compared at the first processing node to a set of predetermined or deduced conditions. A predetermined or deduced response is executed based upon detection of a predetermined or deduced condition within the decoded packets. At least a portion of the decoded packets of the live-data flow causing execution of the predetermined or deduced response are processed at a second processing node to determine a manner for controlling an operation of the network at a same time the live-data flow is in active transmission between the endpoints in the network. The operation of the network is controlled in response to the processing step.

  • Pub Date: 2015/08/12
  • Number: 09369366
  • Owner: Network Kinetix, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system using a direct current signal of a distributed resource modulated by an alternating current signal

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject a direct current (DC) signal from the controllable voltage source converter of at least one DC voltage distributed resource into the distribution system and modulating an alternating current (AC) signal on top of the direct current (DC) signal.

  • Pub Date: 2015/08/12
  • Number: 09442153
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one wind turbine distributed resource

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a wind turbine.

  • Pub Date: 2015/08/12
  • Number: 09417277
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one solar panel distributed resource

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a solar panel.

  • Pub Date: 2015/08/12
  • Number: 09423445
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one microturbine distributed resource

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a microturbine.

  • Pub Date: 2015/08/12
  • Number: 09411006
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one distributed resource having a controllable voltage source converter

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resource comprises a controllable voltage source converter.

  • Pub Date: 2015/08/12
  • Number: 09389270
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one DC voltage distributed resource having a controllable voltage source converter

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a DC voltage distributed resource comprising a controllable voltage source converter.

  • Pub Date: 2015/08/12
  • Number: 09411005
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of locating a fault in a power distribution system comprising at least one cogeneration distributed resource

The present invention provides a method to ensure that distributed resources of a power distribution system remain connected to the circuitry of the power distribution system when a fault occurs at a distributed resource node to assist in identifying the location of the fault by continuing to inject current from the distributed resources into the distribution system, wherein at least one of the distributed resources is a cogeneration resource.

  • Pub Date: 2015/08/12
  • Number: 09417276
  • Owner: The Florida State University Research Foundation, Inc.
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Method of controlling whether an uncompleted transaction applied against a database goes forward using either synchronous or asynchronous replication, or using either encrypted replication or unencrypted replication

Transactions are applied against a database on a transaction processing system. A tracking engine identifies an uncompleted transaction to be joined, joins the uncompleted transaction, and collects one or more non-durable attributes of the joined uncompleted transaction. Collected attributes of the joined uncompleted transaction are compared against rules in a rules engine that are applicable to the transaction to determine whether an applicable rule in the rules engine is met. The joined uncompleted transaction is allowed to go forward and be applied against the database of the transaction processing system using a synchronous replication engine when the applicable rule is met, and an asynchronous replication engine when the applicable rule is not met. Alternatively, the joined uncompleted transaction is allowed to go forward using a replication engine that replicates using encryption when the applicable rule is met, or replicates unencrypted when the applicable rule is not met.

  • Pub Date: 2015/08/12
  • Number: 09569473
  • Owner: Gravic, Inc.
  • Location: Malvern, US
  • Details: Visit USPTO

Visit USPTO Page


Adding card to mobile wallet using NFC

A user enables a communication, such as through a tap, between an NFC-enabled payment or funding card and a mobile device. Card information, such as the card number, type, and expiration date, are read by the mobile device. The user is then authenticated through the user device, such as by entering a CVV code, a PIN for the card, a cardholder name, and/or a billing address for the card. If confirmed, the card is added to the user's mobile/cloud wallet.

  • Pub Date: 2015/08/12
  • Number: 09547857
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Uniform search, navigation and combination of heterogeneous data

A unified interface that abstracts the underlying differences among heterogeneous data sources and data formats to produce uniform search results. While the result of an initial search may be exactly what the user was seeking, it is likely that the result is in the neighborhood of what was sought. It may aid the end user to provide guided data navigation suggestions to locate related data during data exploration, by providing analysis to identify data similarities among disparate data sources, and by providing guided combination options. The guided data navigation suggestions may include suggestions based on schematic, semantic, and social information. Guided data navigation may aid the user in moving from the initial search landing point in the data to the precise result sought.

  • Pub Date: 2015/07/12
  • Number: 09569506
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer program products for automatic mapping between parlay-X short messaging service message element XML encoding and native SMPP protocol data coding scheme

Systems, methods, and computer program products are for mapping an extensible markup language (XML) encoding declarations to a short message peer-to-peer (SMPP) data coding scheme (DCS) for a mobile-terminated (MT) short messaging service (SMS). An exemplary method includes receiving a message from a short message entity (SME) for delivery to a mobile device. The message includes a payload with at least one character encoded in accordance with a first character encoding scheme. The exemplary method further includes receiving from the SME a second encoding scheme for the message, implementing a mapping table to map the first character encoding scheme to the second character encoding scheme, and performing an encoding transformation of the message from the first character encoding to the second character encoding scheme yielding a modified message comprising the payload of the message encoded in the second character encoding scheme as specified by the SME.

  • Pub Date: 2015/07/12
  • Number: 09571430
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Solid imaging apparatus with improved part separation from the image plate

A replenishing device in an additive manufacturing system is disclosed having a sweeper that extends to a base of a reservoir that holds a liquid resin and horizontally across at least a portion of a cure inhibiting layer located on the base of the reservoir that functions as an imaging plate, with the sweeper positioned across at least a portion of a side of the cure inhibiting layer to at least one of retard a flow of the liquid resin across a portion of a top surface of the cure inhibiting layer by providing a physical barrier to the liquid resin, remove debris from the cure inhibiting layer, and agitate the liquid resin. Other devices are also disclosed.

  • Pub Date: 2015/07/12
  • Number: 09486964
  • Owner: B9CREATIONS, LLC
  • Location: Rapid City, US
  • Details: Visit USPTO

Visit USPTO Page


Singleton coordination in an actor-based system

Techniques for singleton coordination in an actor-based system are described herein. In some examples, one or more actors within an actor based system may be designated as singleton actors. Each singleton actor is permitted to have only a single associated instance in the actor-based system. In some cases, when multiple executing instances (i.e., duplicates) of a singleton actor are detected, the duplicates may be resolved, for example, such that no more than a single instance of the singleton actor is retained. In some examples, one or more singleton coordinators may be responsible for selecting one or more hubs on which to generate new or re-generated singletons, monitoring existing singletons to ensure that they continue to execute, and re-generating existing singletons after termination.

  • Pub Date: 2015/07/12
  • Number: 09348672
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Reducing videoconferencing bandwidth usage

Systems and techniques to reduce bandwidth usage of video frames in a videoconferencing system are described. A computing device may receive a first frame of a first video stream from an imaging device and decompose the frame into a plurality of portions. The computing device may select a first portion of the plurality of portions, determine that the first portion matches a sent portion in a sent catalog, determine a first identifier associated with the first portion, and send the first identifier to a server. The computing device may select a second portion of the plurality of portions, determine that the second portion fails to match any of the sent portions in the sent catalog, create and associate a second identifier with the second portion, store the second portion with the second identifier in the sent catalog, and send the second portion to the server.

  • Pub Date: 2015/07/12
  • Number: 09560315
  • Owner: Dell Software, Inc.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Providing conference call aid based on upcoming deadline

Providing a conference call aid based on an upcoming deadline may be provided. In some examples, an application, such as a task management application, detects an expiration of a join duration from a start time of a meeting. In response to the expiration, a late invitee to the meeting is identified. Next, a communication modality to communicate with the late invitee is identified. Furthermore, a communication with the late invitee is established based on the communication modality. A notification to join the meeting is transmitted to the late invitee. The late invitee is notified to join the meeting through the communication.

  • Pub Date: 2015/07/12
  • Number: 09628629
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Neural network learning and collaboration apparatus and methods

Apparatus and methods for learning and training in neural network-based devices. In one implementation, the devices each comprise multiple spiking neurons, configured to process sensory input. In one approach, alternate heterosynaptic plasticity mechanisms are used to enhance learning and field diversity within the devices. The selection of alternate plasticity rules is based on recent post-synaptic activity of neighboring neurons. Apparatus and methods for simplifying training of the devices are also disclosed, including a computer-based application. A data representation of the neural network may be imaged and transferred to another computational environment, effectively copying the brain. Techniques and architectures for achieve this training, storing, and distributing these data representations are also disclosed.

  • Pub Date: 2015/07/12
  • Number: 09613310
  • Owner: Brain Corporation
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Managing contingency capacity of pooled resources in multiple availability zones

A network-based services provider may reserve and provision primary resource instance capacity for a given service (e.g., enough compute instances, storage instances, or other virtual resource instances to implement the service) in one or more availability zones, and may designate contingency resource instance capacity for the service in another availability zone (without provisioning or reserving the contingency instances for the exclusive use of the service). For example, the service provider may provision resource instance(s) for a database engine head node in one availability zone and designate resource instance capacity for another database engine head node in another availability zone without instantiating the other database engine head node. While the service operates as expected using the primary resource instance capacity, the contingency resource capacity may be leased to other entities on a spot market. Leases for contingency instance capacity may be revoked when needed for the given service (e.g., during failover).

  • Pub Date: 2015/07/12
  • Number: 09529682
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Controlled-gradient, accelerated vapor-recompression apparatus and method

An accelerated vapor recompression apparatus converts incoming flow to a concentrate by developing a concentration profile within a tank holding a liquid containing dissolved solids. The resulting curve of saturation temperature of the stratified liquid (such as a brine or other material ) moves away from the curve corresponding to fully mixed conditions. The shift in saturation temperature results in increased boiling without increased energy from a heater or compressor . A method of control of the system provides interventions at different levels of control, ranging from mass flows to work of a compressor , heat from a heater , and a predictive processing of feedback for controlling commands algorithmically.

  • Pub Date: 2015/07/12
  • Number: 09533238
  • Owner: PURESTREAM SERVICES, LLC
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Codeless QR code

A service provider receives, from a user, picture information captured by a user device from a picture mark associated with a product or service of a merchant. It determines a matching picture image by comparing the picture information with picture images in a server, previously registered by the merchant. It also determines, out of attributes previously registered by the merchant, a matching attribute set uniquely associated with the matching picture image. The attributes may be web links, mobile APPs, or any media files that the merchant desires to communicate to users about its products or services. The service provider then communicates to the user the matching attribute set to be loaded on the user device and direct the user to the web links, mobile APPs, or media files that the merchant predetermined.

  • Pub Date: 2015/07/12
  • Number: 09390305
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Biometric assessment in fitness improvement

In some embodiments, an automated system comprises one or more biometric sensors, an interactive screen, and an exercise routine generation application communicable with a mobile application. In some embodiments, the mobile application receives data from an automated station and displays exercise routines, other exercise information, or both. In some embodiments, the mobile application includes a scanner to scan labels, other indicia, or physical or other features of an exercise machine or other exercise apparatus to identify the machine or apparatus. In some embodiments, the mobile application communicates with one or more local or remote databases identifying differing exercise facility locations within a geographic area and identifying exercise apparatus available in each of the differing facilities.

  • Pub Date: 2015/07/12
  • Number: 09474934
  • Owner: Fit Intuition, LLC
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Toll-free telecommunications management platform

A Toll-Free Management Platform (TFMP) includes methods and systems for number administration, customer administration, call management services, texting services and text registry, and a smart services registry. The TFMP may allow users to search for, receive recommendations for, and make reservations of toll-free numbers. A user interface may allow activating a toll-free number, through a one-click activation function and users may access the TFMP to create and access existing templates of toll-free call routing templates, and utilize a routing tree engine to create customized call routing trees for the toll-free numbers of interest to the user. Predictive analytic services may be provided that allow a user through a customizable user interface, or dashboard, to access third party data sources and other information derived from toll-free telecommunications networks.

  • Pub Date: 2015/04/12
  • Number: 09553997
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to select peered border elements for an IP multimedia session based on quality-of-service

Systems and methods to select peered border elements for a communication session based on Quality-of-Service (QoS) are disclosed. An example method includes selecting a peered border element to handle a communication session based on a list of peered border elements (PBEs) and a composite QoS parameter of the communication session, the list of PBEs being prioritized based on respective statuses of PBEs in the list, the first composite QoS parameter being based on weighted QoS parameters of the communication session including a grade of service (GoS) parameter of the communication session and a preferred mode of communication for a VoIP device of a called party in the communication session, the GoS parameter including an attempted performance range and an expected performance range of the communication session; and controlling a second server to generate a QoS authorization token to reserve network resources associated with the selected PBE.

  • Pub Date: 2015/04/12
  • Number: 09521081
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for web-based real time communication with optimized transcoding

A system and method is provided to allow for real-time communication between a web browser application and a contact center resource, where media codecs supported by the two parties may differ. A processor is configured to bridge the media exchanged between the browser and contact center resource. In bridging the media, the processor transcodes the media based on a first media codec for media directed to and from the web browser application, and further transcodes the media based on the second media codec for media directed to and from a contact center resource.

  • Pub Date: 2015/04/12
  • Number: 09648169
  • Owner: GENESYS TELECOMMUNICATIONS LABORATORIES, INC.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Method of hosting a first application in a second application

A method of hosting a first application (e.g., a virtual application) inside a second application (e.g., a control displayed by a web browser). The method includes executing the first application inside a runtime environment generated at least in part by a runtime engine. The executing first application calls user interface functions that when executed inside the runtime environment generate a first user interface. The runtime engine captures these calls, generates messages comprising information associated with the captured calls, and forwards the messages to a user interface manager that is a separate application from the runtime engine. The user interface manager receives the messages, translates the information associated with the captured calls into instructions for the second application, and sends the instructions to the second application. The control receives the instructions sent by the user interface manager, and displays a second user interface for the first application based on the instructions.

  • Pub Date: 2015/04/12
  • Number: 09626237
  • Owner: CODE SYSTEMS CORPORATION
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Determining quality of a summary of multimedia content

A quality metric of a multimedia summary of a multimedia content item is determined based, in part, on semantic similarities of the summary and content item, rather than just on word frequencies. This is accomplished in some embodiments by identifying a semantic meaning of the summary and multimedia content item using vector analysis. The vectors of the summary and the vectors of the multimedia content item are compared to determine semantic similarity. In other examples, the quality metric of the multimedia summary is determined based on, in part, a coherence between an image portion of a summary and a text portion of the summary for determining a quality metric of a multimedia summary.

  • Pub Date: 2015/04/12
  • Number: 09454524
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Delivery of instructions in host applications

Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.

  • Pub Date: 2015/04/12
  • Number: 09363311
  • Owner: TEALIUM INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Computer implemented methods and apparatus for feed-based case management

Techniques for providing feed-based case management on an online social network. A user interface that includes a publisher and an information feed is provided. Information associated with a record is received and the record is updated in a database system. A feed item associated with the database system update is generated and provided in the information feed. The feed item includes one or more actionable selections providing a reference to the publisher. Selection of one of the one or more actionable selections causes the publisher to be operable to receive further information associated with the record. The record is capable of being updated based on the further information. In some implementations, the record is a case and the user interface serves as a single interface for all interactions required in solving the case.

  • Pub Date: 2015/04/12
  • Number: 09600510
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud-based multi-layer security architecture with hub and spoke development environment

A system may receive a development update. The system may authenticate the development update. The system may progress the development update through multiple stages of development. The multiple stages of development may include a first virtual network including a group of development servers. The multiple stages of development may include a second virtual network including a group of quality assurance and testing servers. The multiple stages of development may include a third virtual network including a group of end-to-end testing servers. The multiple stages of development may include a fourth virtual network including a group of staging servers. The multiple stages of development may include a fifth virtual network including a group of production servers. The system may connect to the first virtual network, the second virtual network, the third virtual network, the fourth virtual network, and the fifth virtual network in a hub-and-spoke configuration.

  • Pub Date: 2015/04/12
  • Number: 09419857
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating personalized short links and monitoring activity

A computerized method and system to generate individualized shortened URLs and track user activity is disclosed. A method includes generating an individualized shortened URLs for each of a plurality of recipients, sending communications to each of the plurality of recipients, wherein each of the communications includes the individualized shortened URL, receiving a request from at least one of the plurality of recipients for the individualized shortened URL, and referring the request to a destination URL.

  • Pub Date: 2015/03/12
  • Number: 09497278
  • Owner: SALESFORCE.COM, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Joint crosstalk-avoidance and error-correction coding for parallel data busses

System, methods, and apparatus are described that facilitate transmission/reception of data over a multi-line parallel bus. In an example, the apparatus transmits data bits over a parallel bus includes determining from a prior bus state, a plurality of free wires in the bus for a current bus state, where each free wire satisfies a crosstalk-avoidance constraint in the current bus state for all values of a bit transmitted on the free wire. The apparatus may encode a plurality of data bits using a crosstalk avoidance encoder to obtain a CAC-encoded word, compute an error detection or correction code for the CAC-encoded word, assign bits of the error detection or correction code to the plurality of free wires for transmission during the current bus state, and assign the CAC-encoded word to unassigned wires of the bus for transmission during the current bus state.

  • Pub Date: 2015/03/12
  • Number: 09654251
  • Owner: QUALCOMM INCORPORATED
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Immersive telepresence

In general, the immersive telepresence implementations described herein allow desired telepresence experiences of users or telepresence travel participants to be automatically matched with travel volunteers that can provide these telepresence experiences. The mobile computing devices of the travel volunteers provide audio, video and other data to the travel participant so that the travel participant can experience the sights and sounds of a desired telepresence experience (which can include location and time, as well as a desired activity) without the travel participant physically being present. The immersive telepresence implementations described herein automatically find matches between telepresence experiences on a list (e.g., bucket list) of a travel participant and one or more travel volunteers and provide for various features to provide an immersive and personalized telepresence experience for the travel participant.

  • Pub Date: 2015/03/12
  • Number: 09591260
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Execution of end-to-end-processes across applications

An orchestrator executes an end-to-end process across applications. The executing of the end-to-end process by the orchestrator comprises executing flow logic by the orchestrator, the flow logic according to a data model defining arguments to include in interactions between the orchestrator and each of the applications. A message broker exchanges information among the orchestrator and the applications.

  • Pub Date: 2015/03/12
  • Number: 09311171
  • Owner: Hewlett Packard Enterprise Development LP
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic device having a tray for accommodating cards

An electronic device that accommodates a plurality of cards is provided. The electronic device includes a first contact area connected to a first card among the plurality of cards and a second contact area selectively connected to one of a second card or a third card among the plurality of cards.

  • Pub Date: 2015/03/12
  • Number: 09647359
  • Owner: Samsung Electronics Co., Ltd.
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Dynamic optimizing scanner for identity and access management (IAM) compliance verification

An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts.

  • Pub Date: 2015/03/12
  • Number: 09600666
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for transitioning between multiple video portions produced based on multiple encodings

Systems, methods, and non-transitory computer-readable media can identify a beginning portion and a remaining portion of a video to be encoded. A first constant quality variable bit rate encoding process can be applied to the beginning portion, based on a first set of encoding parameters, to produce an encoded beginning portion. A second constant quality variable bit rate encoding process can be applied to the remaining portion, based on a second set of encoding parameters, to produce an encoded remaining portion. The encoded beginning portion can be provided for video playback. The encoded remaining portion can be provided, when requested, for video playback subsequent to the encoded beginning portion.

  • Pub Date: 2015/02/12
  • Number: 09648395
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Physical layer management for an active optical module

Embodiments described herein are directed to a cable assembly including at least a first optical fiber extending from a first end to a second end and an active optical module (AOM) attached to the first end of the first optical fiber and including a first storage device that is electrically connected to the electrical connector. The cable assembly also includes a passive optical connector terminating the second end of the first optical fiber and including a second storage device. The first storage device includes an AOM identifier stored therein identifying the active optical module and the second storage device includes first information stored therein indicating that the first end of the first optical fiber is associated with the AOM identifier.

  • Pub Date: 2015/02/12
  • Number: 09602897
  • Owner: CommScope Technologies LLC
  • Location: Hickory, US
  • Details: Visit USPTO

Visit USPTO Page


Channel selection in a mobile communication device application framework

A user equipment (UE) comprising a processor, a memory, a radio transceiver, and a mobile application framework client stored in the memory. When executed by the processor the client receives a request for a communication service via an API, builds a service request message comprising an application identity and an identity of the requested service, transmits the service request message via the radio transceiver directed through a first communication channel defined by a first access point node (APN) specified by the client to a server, receives a first service response message comprising a second APN from the server, transmits the service request message via the radio transceiver directed through a second communication channel defined by the second APN to the server, and receives a second service response message from the second communication channel defined by the second APN from the server.

  • Pub Date: 2015/02/12
  • Number: 09521504
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless beacon and methods

A method for distributing micro-location-based notifications to a computing device includes receiving a unique identifier associated with a first entity, the unique identifier collected from a wireless beacon by a computing device proximal the wireless beacon, receiving identification of a second entity affiliated with the wireless beacon from the first entity; and in response to positive identification of the second entity as an authorized entity, authorizing delivery of a communication from the second entity, the communication executing on the computing device responsive to receipt of the unique identifier at the computing device.

  • Pub Date: 2015/01/12
  • Number: 09491586
  • Owner: Estimote, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for creating customized music arrangements

Systems and methods for creating customized music arrangements based on multiple criteria are provided herein. A user selects a musical composition and provides ensemble information about an ensemble, such as the number of instruments, instrument types, and playing ability of each member of an ensemble to the system. When inputted instrumentation or proficiency does not work within the pre-determined parameters of the musical selection, notification is provided to the user, and the system rebalances the arrangement to accommodate the proficiencies of the ensemble. In embodiments, the system is configured to transpose portions of a musical score into a range suitable for a substitute instrument or a player of limited skill. The user receives a conductor's score arrangement that has been adapted for each member of the ensemble and tailored to balance the entire ensemble. The system is capable of receiving ensemble information and creating customized musical arrangements in real-time.

  • Pub Date: 2015/01/12
  • Number: 09489932
  • Owner: NiceChart, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Selective partition based redirection for multi-partitioned USB devices

Universal serial bus (USB) devices may be redirected to a server to create USB virtual devices. Each of the USB devices to be redirected may have one or more partitions but each partition may not be suitable for redirection. A user may select one or more partitions for redirection. The server may read the selected partitions. The server will create virtual volumes for only the selected partitions and will mount a file system for each of the selected partitions only.

  • Pub Date: 2015/01/12
  • Number: 09582444
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Partitioning digital media for consumption

Embodiments of the present invention partition digital media content. One or more processors identify an episode of digital media content based on subscription preferences of a user. The one or more processors respond to a determination that a duration of the episode is less than or equal to a combined duration of two free time slots in an electronic calendar of a user by partitioning the episode into at least two segments. A first episode segment has a duration that is less than or equal to a duration of the first free time slot. A second episode segment has a duration that is less than or equal to the duration of the second free time slot. The one or more processors associate, in the electronic calendar, the first episode segment with the first time slot and the second episode segment with the second time slot.

  • Pub Date: 2015/30/11
  • Number: 09537922
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Online logo tool

An online tool allows a user, such as an online merchant, to access a page of a service provider, select a format, customize funding sources and designs, and copy and paste the code to the merchant page to quickly and easily create a customized funding source graphic.

  • Pub Date: 2015/30/11
  • Number: 09459782
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient operations of components in a wireless communications device

Various embodiments comprise apparatuses and methods including a communications subsystem having an interface module and a protocol module with the communications subsystem being configured to be coupled to an antenna. An applications subsystem includes a software applications module and an abstraction module. The software applications module is to execute an operating system and user applications; the abstraction module is to provide an interface with the software applications module. A controller interface module is coupled to the abstraction module and the interface module and is to convert signals from the applications subsystem into signals that are executable by the communications subsystem. Additional apparatuses and methods are described.

  • Pub Date: 2015/30/11
  • Number: 09542242
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive timeouts for security credentials

Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach reduces the ability of entities obtaining a copy of the cookie from performing unauthorized tasks on a session. A cookie received with a request can contain a timestamp and an operation count for a session that may need to fall within an acceptable range of the current values in order for the request to be processed. A cookie returned with a response can be set to the correct value or incremented from the previous value based on various factors. The allowable bands can decrease with age of the session, and various parameter values such as a badness factor for a session can be updated continually based on the events for the session.

  • Pub Date: 2015/30/11
  • Number: 09571488
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive runtime for a multiprocessing API

A computer-implemented method includes selecting a runtime for executing a program. The runtime includes a first combination of feature implementations, where each feature implementation implements a feature of an application programming interface (API). Execution of the program is monitored, and the execution uses the runtime. Monitor data is generated based on the monitoring. A second combination of feature implementations are selected, by a computer processor, where the selection is based at least in part on the monitor data. The runtime is modified by activating the second combination of feature implementations to replace the first combination of feature implementations.

  • Pub Date: 2015/30/11
  • Number: 09495274
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Software and metadata structures for distributed and interactive database architecture for parallel and asynchronous data processing of complex data and for real-time query processing

The various embodiments of the invention provide software and metadata structures for a data processing system and method, for applications such as marketing campaign management, speech recognition and signal processing. An exemplary system embodiment includes a first data repository adapted to store a plurality of entity and attribute data; a second data repository adapted to store a plurality of entity linkage data; a metadata data repository adapted to store a plurality of metadata modules, with a first metadata module having a plurality of selectable parameters, received through a control interface, and having a plurality of metadata linkages to a first subset of metadata modules; and a multidimensional data structure. The control interface may modify the plurality of selectable parameters in response to received control information. A plurality of processing nodes are adapted to use the plurality of selectable parameters to assemble a first plurality of data from the first and second data repositories and from input data, to reduce the first plurality of data to form a second plurality of data, and to aggregate and dimension the second plurality of data for storage in the multidimensional data structure.

  • Pub Date: 2015/29/11
  • Number: 09454578
  • Owner: Experian Marketing Solutions, Inc.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Providing and controlling embeddable gaming content

A wagering game system and its operations include detecting, via a first web widget presented via a casino website, identifying information for a casino user account. The casino user account is hosted by a casino server. The first web widget is hosted by a second server separate from the casino server. The operations can further include determining, by at least one of one or more processors, a relationship between the casino user account and a second user account associated with the second server. The determining the relationship can be in response to detecting the identifying information. The operations can further include associating, by at least one of the one or more processors, the casino user account and the second user account in response to determining the relationship.

  • Pub Date: 2015/27/11
  • Number: 09478101
  • Owner: BALLY GAMING, INC.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Video call method in packet-switched network and device supporting the same

An electronic device including a communication module configured to connect a packet based video call to a user equipment, an image processing module configured to generate a transmission image for the video call, and a control module configured to control a frame type of a transmission image generated by the image processing module based on tune-away information received from the user equipment.

  • Pub Date: 2015/25/11
  • Number: 09544536
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-Si, KR
  • Details: Visit USPTO

Visit USPTO Page


Substituted imidazo[1,2-b]pyrazoles as bruton'S tyrosine kinase modulators

  • Pub Date: 2015/25/11
  • Number: 09556188
  • Owner: BeiGene, Ltd.
  • Location: Grand Cayman, KY
  • Details: Visit USPTO

Visit USPTO Page


Probiotic compositions containing clostridiales for inhibiting inflammation

Pharmaceutical compositions containing microbial entities are described herein. The pharmaceutical compositions may optionally contain or be used in conjunction with one or more prebiotics. Uses of the pharmaceutical compositions to treat or prevent disorders of the local or systemic microbiome in a subject are also provided.

  • Pub Date: 2015/25/11
  • Number: 09610307
  • Owner: Evelop Biosciences, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Myonectin (CTRP15), compositions comprising same, and methods of use

Disclosed is the novel myokine known as myonectin (CTRP15), an isolated nucleic acid encoding the myonectin (CTRP15) gene, and the amino acid sequence encoding the myonectin (CTRP15) protein. Methods of isolation of the nucleic acid, protein, polypeptides and methods of making anybodies to myonectin (CTRP15) protein are provided. The use of myonectin (CTRP15) in the modulation of lipid and/or glucose metabolism, suppressing the expression of autophagy genes, inhibiting LC3 lipidation and autophagosome-dependent p62 degradation, and activating the Akt/mTOR pathway is also provided.

  • Pub Date: 2015/25/11
  • Number: 09545433
  • Owner: The Johns Hopkins University
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to dynamically select a peered voice over internet protocol (VoIP) border element

Methods and apparatus to select a dynamically peered voice over Internet protocol (VoIP) border element are disclosed. An example method comprises collecting data representative of a dynamic performance of a voice over Internet protocol network, prioritizing a selection of a peered border element based on the collected data, and modifying a telephone number mapping (ENUM) database based on the prioritized selection.

  • Pub Date: 2015/25/11
  • Number: 09661148
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Machine learning for determination of shipping rules and shipping methods for order fulfillment

Systems, methods, and devices for determining shipping rules and shipping methods for an order are disclosed herein. A computer implemented method includes receiving an electronic record of an order placed with a merchant. The method further includes determining a smallest available package size in which the order content can be shipped and one or more additional available package sizes having dimensions larger than the smallest available package size in which the order content can be shipped. The method also includes determining a shipping price to ship the order content and presenting a plurality of shipping methods to a user with the shipping price.

  • Pub Date: 2015/25/11
  • Number: 09619775
  • Details: Visit USPTO

Visit USPTO Page


Complement factor B analogs and their uses

The invention provides polypeptides comprising a complement factor B analog. The invention also provides various complement factor B analogs including complement factor B analogs comprising a mutation of a free cysteine amino acid and related methods, nucleic acids and vectors. These complement factor B analogs and related methods, nucleic acids and vectors can be used to modulate a complement pathway or for the study and/or treatment of various conditions or diseases related to a complement pathway.

  • Pub Date: 2015/25/11
  • Number: 09533028
  • Owner: Wellstat ImmunoTherapeutics, LLC
  • Location: Gaithersburg, US
  • Details: Visit USPTO

Visit USPTO Page


Communication power operating method and electronic device supporting the same

An electronic device includes a communication interface configured to establish a communication channel; and a controller configured to adjust an amplification current of a signal outputted through the communication channel corresponding to a measured Adjacent channel leakage ratio (ACLR) based on the communication channel, wherein the controller is configured to adjust a size of the amplification current corresponding to a difference between the measured ACLR and a specified condition.

  • Pub Date: 2015/25/11
  • Number: 09615334
  • Owner: SAMSUNG ELECTRONICS CO., LTD
  • Location: Suwon-si, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Cloud-based platform integrating point of sale devices of different types and/or formats

A device may receive information regarding a product order via a web portal. The product order may relate to a take-out or delivery of a food product. The device may identify a store location associated with fulfilling the product order. The device may select a store configuration, from a set of store configurations associated with a set of store locations, for the store location associated with fulfilling the product order based on identifying the store location. The device may perform, based on information associated with the particular type of POS device, one or more data conversions on data identifying the product order to generate a converted product order. The converted product order may be associated with a format compatible with the particular type of POS device. The device may store the converted product order in a queue associated with the store location.

  • Pub Date: 2015/25/11
  • Number: 09595061
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System for encoding customer data

A system for transforming customer data includes a network interface and a processor. The network interface communicates a request for customer data associated with a particular geographical area. It also receives a customer profile code associated with the customer data, wherein the customer profile code comprises a first code segment and a second code segment. It further receives first and second rules associated with the customer profile code. The processor transforms the first and second code segments into customer data using the rules. It further analyzes the particular geographical area using the customer data.

  • Pub Date: 2015/24/11
  • Number: 09449328
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Single sign-on (SSO) for mobile applications

A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access.

  • Pub Date: 2015/24/11
  • Number: 09407628
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for communicating content to connected vehicle users based detected tone/mood in voice input

Methods, systems and cloud processing are provided for coordinating and processing user input provided to vehicles during use. One example is for processing voice inputs at a vehicle to identify a mood of a user and then modifying or customizing the vehicle response based on the detected mood, physical characteristic and/or physiological characteristic of the user. One example includes sending, to a cloud processing server, data from the vehicle. The vehicle includes an on-board computer for processing instructions for the vehicle and processing wireless communication to exchange data with the cloud processing server. The method then receives, at the vehicle, data for a user account to use the vehicle. The cloud processing server uses the user account to identify a user profile of a user. Then, receiving, from the cloud processing server, voice profiles for the user profile. Each voice profile is associated with a tone identifier or audio signature. The voice profiles for the user are learned from a plurality of voice inputs made to the vehicle by the user in one or more prior sessions of use of the vehicle. The method further includes receiving, by on-board computer, a voice input. For the voice input, processing, by on-board computer, the voice input to identify a voice profile that is correlated to the voice input and generating a vehicle response for the voice input. The vehicle response is moderated based on the tone identifier of the identified voice profile. In one example, the tone identifier is used to infer a mood of the user, and the moderation of the vehicle response assists in selecting a type of response by the vehicle and/or setting made to a vehicle system.

  • Pub Date: 2015/24/11
  • Number: 09493130
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for time series analysis techniques utilizing count data sets

Systems and methods are included for adjusting a set of predicted future data points for a time series data set including a receiver for receiving a time series data set. One or more processors and one or more non-transitory computer readable storage mediums containing instructions may be utilized. A count series forecasting engine, utilizing the one or more processors, generates a set of counts corresponding to discrete values of the time series data set. An optimal discrete probability distribution for the set of counts is selected. A set of parameters are generated for the optimal discrete probability distribution. A statistical model is selected to generate a set of predicted future data points. The set of predicted future data points are adjusted using the generated set of parameters for the optimal discrete probability distribution in order to provide greater accuracy with respect to predictions of future data points.

  • Pub Date: 2015/23/11
  • Number: 09418339
  • Owner: SAS Institute, Inc.
  • Location: Cary, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for performing dynamic spectrum arbitrage based on eNodeB transition states

A dynamic spectrum arbitrage (DSA) system may include a dynamic spectrum policy controller (DPC) and a dynamic spectrum controller (DSC) that together dynamically manage the allocation and use of resources (e.g., spectrum resources) across different networks. The DSC and/or DPC components may be configured to monitor a congestion state of an eNodeB, and intelligently allocate resources, manage user traffic of the eNodeBs, select target eNodeBs for handovers, determine the quality of service (QoS) levels that are to be given to wireless devices attached to the eNodeBs, and/or perform other similar operations to intelligently manage the allocation and use of resources by the various networks. The DPC and/or DSC components may be also configured to perform these and other operations based on the transitions, changes, transition rates, or rates of change in the congestion levels of the network components.

  • Pub Date: 2015/23/11
  • Number: 09479941
  • Owner: Rivada Networks, LLC
  • Location: Colorado Springs, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for remote identity proofing service issuing trusted identities

Illustrative methods, processes, and software are disclosed herein that remotely prove the identity of individuals fully compliant with identity proofing standards and policies. The embodiments may utilize photo identification and government identities using networked capabilities and capabilities within a process for end-to-end fully remote identity proofing followed by the automated provisioning and issuance of a trusted identity and optional credentials. In alternative manifestations the embodiments use automated government identity lookups including but not limited to digital imagery equipment with artificial intelligence and pattern recognition to detect fraudulent physical identification articles remotely, electronic scans of magnetic stripes and other electronic markers on government-issued identification media including but not limited to drivers licenses, government employee identities, passports, or other government-issued identities combined with real-time lookup in trusted databases. In alternative manifestations the embodiments use multiple biometric form factors for proofing, registration, recognition, and authentication.

  • Pub Date: 2015/23/11
  • Number: 09491160
  • Owner: MICHIGAN HEALTH INFORMATION NETWORK-MIHIN
  • Location: East Lansing, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing provably secure user input/output

A method, non-transitory computer readable medium and apparatus for securing user input and/or output on a mobile endpoint device. For example, the method receives an input on the mobile endpoint device, encrypts and authenticates the input in a trusted domain of the mobile endpoint device executing an application and sends the input that is encrypted and authenticated to an untrusted domain of the mobile endpoint device over a secure channel.

  • Pub Date: 2015/23/11
  • Number: 09524394
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for pre-fetching remote resources for subsequent display on a mobile computing device

A computer-implemented method and system for pre-fetching remote resource data from a remote mapping system for display on a client computing device is disclosed. Data received at a client device from an online mapping system in response to a query from the client device includes vector and remote resource data. Vector data is rasterized by the client device to depict graphical elements that are easily described by mathematical formulas. Remote resource data includes digital map elements that are not easily described by vectors, but instead, must be relayed to the client device as either bitmaps or references (e.g., URLs) to remote resources that are resolved at the backend or the client device. This remote resource data is prefetched to a client device so that it will be available for subsequent mapping application searches without resolving a corresponding reference to the remote resource data for each search.

  • Pub Date: 2015/23/11
  • Number: 09491255
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Interfacing between a dynamic spectrum policy controller and a dynamic spectrum controller

A dynamic spectrum arbitrage (DSA) system may include a dynamic spectrum policy controller (DPC) and a dynamic spectrum controller (DSC) that together dynamically manage the allocation and use of resources (e.g., spectrum resources) across different networks. A dynamic spectrum arbitrage application part (DSAAP) protocol/component/module may allow, facilitate, support, or augment communications between the DSC and DPC so as to improve the efficiency and speed of the DSA system. The DSAAP may allow the DPC and/or DSC components to better pool resources across the different networks, better monitor traffic and resource usage in the various networks, to more efficiently communicate bids and bidding information, to quickly and efficiently register and deregister components, and better perform backoff operations. The DSAAP may improve the DSA resource auctioning operations by improving the performance and efficiency of the procedures for bidding, generating invoices, advertizing resources, requesting resources, purchasing resources, validating bid credentials, etc.

  • Pub Date: 2015/23/11
  • Number: 09462574
  • Owner: Rivada Networks, LLC
  • Location: Colorado Springs, US
  • Details: Visit USPTO

Visit USPTO Page


Index server architecture using tiered and sharded phrase posting lists

An information retrieval system uses phrases to index, retrieve, organize and describe documents. Phrases are extracted from the document collection. Documents are the indexed according to their included phrases, using phrase posting lists. The phrase posting lists are stored in an cluster of index servers. The phrase posting lists can be tiered into groups, and sharded into partitions. Phrases in a query are identified based on possible phrasifications. A query schedule based on the phrases is created from the phrases, and then optimized to reduce query processing and communication costs. The execution of the query schedule is managed to further reduce or eliminate query processing operations at various ones of the index servers.

  • Pub Date: 2015/23/11
  • Number: 09652483
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting malware on mobile devices

In one example, a mobile device includes a network interface configured to receive data for an application including a set of application permissions describing elements of the mobile device to which the application will have access upon installation of the application, and a processing unit configured to determine a type for the application and, based on an analysis of the set of application permissions and the type for the application, determine whether the application includes malware.

  • Pub Date: 2015/23/11
  • Number: 09576130
  • Owner: Pulse Secure, LLC
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Deployment of database objects

A system, a method, and a computer program product for deploying of objects are disclosed. At least one file containing a plurality of artifacts for deploying during runtime of an application is defined. Each artifact in the plurality of artifacts includes at least one object in the plurality of objects required to be deployed during runtime of the application. At least one dependency for at least one artifact in the plurality of artifacts is determined. An execution order for deployment of the plurality of artifacts is generated. The plurality of artifacts is deployed in accordance with the generated execution order.

  • Pub Date: 2015/23/11
  • Number: 09600269
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Rules-based compliance system

A rules-based compliance system enables a permitted user to define one or more contact attempt suppression rules, wherein each contact attempt suppression rule is adapted to be triggered when a configurable number of past contact attempts as defined in the contact attempt suppression rule have been attempted. A set of contacts are then received by the system. During a communications campaign, and before being issued, a contact in the set of contacts is compared against each of the one or more contact attempt suppression rules. The compliance system is then operative to suppress at least one contact based on a result of the comparison that indicates that a given one of the one or more contact attempt suppression rules is satisfied for the contact. A user may also provision one or more contact location rules that suppress contacts based on location information.

  • Pub Date: 2015/20/11
  • Number: 09591135
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


RFID tag and reader authentication by trusted authority

A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to a verification authority; and receiving a reply from the verification authority. The reader and the verification authority may mutually authenticate each other before, during, or after the tag authentication process. The verification authority may notify a designated party if a response is incorrect.

  • Pub Date: 2015/20/11
  • Number: 09501675
  • Owner: IMPINJ INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning dedicated network resources with API services

Embodiments are disclosed that provision a cloud-based service together with a dedicated network connection to provision a cloud-based service element. In response to the request both the cloud-based service element and a dedicated network connection are provisioned. Provisioning the cloud-based service element together with the dedicated network connection enables the cloud-based service element to utilize the dedicated network connection.

  • Pub Date: 2015/20/11
  • Number: 09491066
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Prioritizing security findings in a SAST tool based on historical security analysis

A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing to facilitate reducing security vulnerabilities. To the end, a crowdsourcing platform and social network are associated with the application development environments. Access to the social network platform by users of the application development environments is enabled. The anonymous access enables users to post messages without exposing sensitive data associated with a particular application development environment. As the static analysis security tool is used, a knowledgebase of information regarding identified security findings, fix priorities, and so forth, is continuously updated. Social network content (e.g., in the form of analytics, workflow recommendations, and the like) is then published from the knowledgebase to provide users with security knowledge generated by the tool from the set of application development environments. The approach provides for secure and anonymous cross-organization information sharing based, for example, on analytics generated by an analytics platform.

  • Pub Date: 2015/20/11
  • Number: 09544327
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Optical disc library apparatus having magazine-disc association information, optical disc, and optical disc library system

The optical disc library apparatus of the present disclosure includes one or more magazines configured to store a plurality of optical discs, a plurality of optical disc drives configured to perform recording or reproducing on or from the optical discs, a changer mechanism configured to perform loading or ejecting any optical disc stored in the magazine to or from any optical disc drive, and a controller configured to control the changer mechanism. The magazine includes magazine-disc association information associating magazine information specifying the magazine with disc information specifying a plurality of optical discs to be stored in the magazine. The controller outputs the magazine-disc association information.

  • Pub Date: 2015/20/11
  • Number: 09542971
  • Owner: Panasonic Intellectual Property Management Co., Ltd.
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and system for setting quality of service in a communication system

A method and apparatus for determining a Quality of Service (QoS) level in a mobile communication system comprises an access gateway. The access gateway receives an indication of a change of an active talk group of a first communication device operating on a first network. The access gateway formulates a QoS modification request message to forward to a second network. The message requests modification of the QoS for a second communication device that is receiving broadband service from the second network. The second communication device belongs to the same user as the first communication device. An interface between the network entity and the second network provides the QoS modification request message to the second network. The first communication device may be a portable or mobile radio, and the second communication device may be an LTE communication device. The first network may be a Land Mobile Radio system.

  • Pub Date: 2015/20/11
  • Number: 09510243
  • Owner: MOTOROLA SOLUTIONS, INC.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Low-noise amplifier mixer with coupled inductors

A Radio Frequency Identification (RFID) reader configured to perform self-jammer cancellation (SJC) may include an SJC module coupled to a low-noise amplifier (LNA), which in turn may be coupled to a mixer via an LNA-mixer interface. The interface may be implemented with a horizontal matching circuit that includes four inductors magnetically and direct-current (DC) coupled to each other. In some embodiments, the inductors may each be implemented using a different segment of a single inductor.

  • Pub Date: 2015/20/11
  • Number: 09503160
  • Owner: IMPINJ INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Last-hop processing for reverse direction packets

Some embodiments provide a method for a first managed forwarding element that implements a logical network. The method receives a packet from a second managed forwarding element. The first packet has an initial set of characteristics defining a first connection between a source machine connected to the second managed forwarding element and a destination machine connected to the first managed forwarding element. The method determines whether a second connection exists with the initial set of characteristics between a different machine connected to a third managed forwarding element and the destination machine. When a second connection exists with the initial set of characteristics, the method modifies at least one characteristic of the packet such that the modified packet does not have the same set of characteristics. The method delivers the modified packet to the destination machine.

  • Pub Date: 2015/20/11
  • Number: 09602404
  • Owner: NICIRA, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Generating graphical representations of event participation flow

A system comprising a computer-readable storage medium storing at least one program and a method for generating graphical representations of event participation flows are presented. In example embodiments, the method includes receiving a subject event identifier entered as user input via a user interface. The method further includes accessing event data including a plurality of event data records that include an event record corresponding to the subject event identifier. The event record includes a set of participant identifiers corresponding to participants of a subject event identified by the subject event identifier. The method further includes determining an event participation flow for the participants of the subject event using the event data, and causing presentation of a graphical representation of the event participation flow in the user interface.

  • Pub Date: 2015/20/11
  • Number: 09424669
  • Owner: Palantir Technologies Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient delivery of content by virtualization of static interaction with the document object model

A method of updating a document object model (DOM) is disclosed. A message is received from a web browser requesting for information to update the DOM. A dummy response message is sent to the web browser, wherein the dummy response message does not include the information to update the DOM, and wherein the dummy response message causes the web browser to create a dummy node in the DOM. A request message is received from a client as part of a client-server protocol, wherein the request message requests at least a portion of the information to be sent to the client. A first response message is sent including at least a portion of the information to the client, wherein the first response message is processed by the client to determine a first update to the DOM, and wherein the first update is applied to the DOM.

  • Pub Date: 2015/20/11
  • Number: 09645984
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Determining influence in a social networking system

An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.

  • Pub Date: 2015/20/11
  • Number: 09542694
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Crowd-sourced security analysis

A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing to facilitate reducing security vulnerabilities. To the end, a crowdsourcing platform and social network are associated with the application development environments. Access to the social network platform by users of the application development environments is enabled. The anonymous access enables users to post messages without exposing sensitive data associated with a particular application development environment. As the static analysis security tool is used, a knowledgebase of information regarding identified security findings, fix priorities, and so forth, is continuously updated. Social network content (e.g., in the form of analytics, workflow recommendations, and the like) is then published from the knowledgebase to provide users with security knowledge generated by the tool from the set of application development environments. The approach provides for secure and anonymous cross-organization information sharing.

  • Pub Date: 2015/20/11
  • Number: 09531745
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Client-side rendering for virtual mobile infrastructure

A virtual mobile infrastructure performs client-side rendering by intercepting and redirecting screen data for generating a screen image of a remote mobile operating system from a server computer to a mobile client device. The mobile client device receives the screen data and generates the final screen image of the remote mobile operating system. The screen data include drawing application programming interface (API) calls to generate surfaces for applications running on the remote mobile operating system and data for compositing the surfaces together. The mobile client device makes the drawing API calls to generate the surfaces and generates the final screen image of the remote mobile operating system by compositing the surfaces in accordance with the compositing data.

  • Pub Date: 2015/20/11
  • Number: 09654603
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Assessing security risks associated with connected application clients

A method for assessing security risks associated with a cloud application to which one or more connected applications are coupled begins by configuring a security risk assessment application to function as a connected application. The security risk assessment application collects “first” data associated with one or more accounts, and “second” data associated with the one or more connected applications coupled to the cloud application. After receiving the first and second data, the security risk assessment application instantiates that data into a generic “data object” that the system uses to represent each account and each of the connected applications. Each such data object thus is populated either with the first data or the second data, depending on whether the data object represents an account or a connected application. A risk assessment is then applied to the generic data object to assess a security risk associated with the cloud application.

  • Pub Date: 2015/20/11
  • Number: 09591016
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Application self-service for assured log management in cloud environments

A log management service provides automated log management for any applications deployed on a cloud. A security profile defining the logging requirements for the application is associated with the application. During deployment, a deployment appliance queries the service, providing an application context and deployment topology. The log management service references the supplied application context and deployment topology against the defined log requirements in the security profile and, in response, determines an applicable set of log files, residency and longevity requirements. The log management service then identifies/specifies the log collection resources and requirements that are necessary and instructs the requesting deployment process to configure the one or more log sources and event collectors as needed. As log data is generated by the log sources, logs are sent to a specified log management service provider for the deployed application, and the log management service provider handles particular audit requirements.

  • Pub Date: 2015/20/11
  • Number: 09578063
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing search engine ranking by recommending content including frequently searched questions

Systems and method of the present invention provide for one or more server computers configured to receive one or more keywords topically relevant to a content of a web page, request from a search engine a first metric comprising a quantity of times the keywords have appeared in a search query with one or more question keywords during a time period and a second metric comprising a probability of receiving a high rank associated with the one or more keywords and the one or more question keywords, receive, from the search engine, the first metric and the second metric, calculate a keyword effectiveness index from the first metric and the second metric, and generate and transmit to a client computer one or more recommendations to include a high ranked suggested content on the web page according to the keyword effectiveness index.

  • Pub Date: 2015/19/11
  • Number: 09460217
  • Owner: Go Daddy Operation Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Neuroprotective chemicals and methods for identifying and using same

Provided herein are methods for identifying a compound having cell-protective (e.g., neuroprotective) activity. Compounds identified therefrom are also provided. These compounds can be used to treat various diseases, disorders, or conditions associated with, for example, unwanted cell death.

  • Pub Date: 2015/19/11
  • Number: 09645139
  • Owner: Board of Regents of The University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Network switching system using software defined networking applications

A network switching system includes a storage device including a plurality of application-provided flow-based rules provided by a plurality of applications. A packet processor is coupled to the storage device and includes a flow-based handler that is operable to receive a packet, determine that the packet is associated with a flow session, and associate a plurality of the application-provided flow-based rules with the packet based the association of the packet with the flow session. The packet processor also includes a flow-based rule processing engine that is operable to determine a priority for the plurality of application-provided flow-based rules and apply at least one of the plurality of application-provided flow-based rules to the packet according to the priority. The system allows a plurality of SDN applications to operate in a network switching system independently and without knowledge of each other.

  • Pub Date: 2015/19/11
  • Number: 09577944
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for constructing content site visitor profiles

Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.

  • Pub Date: 2015/18/11
  • Number: 09313287
  • Owner: TEALIUM INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Forecasting future states of a multi-active cloud system

An embodiment of the invention may include a method, computer program product and computer system for forecasting future states of a multi-active cloud. The method, computer program product and computer system may include a computing device that determines the operating state of the passive server. The operating state of the passive server is one or more of a deploying state and a smoke testing state. The computing device may determine the probability of the operating state successfully completing. The computing device may delay the second asynchronous workflow until the operating state successfully completes based on the probability of the operating state successfully completing exceeding a predetermined value.

  • Pub Date: 2015/18/11
  • Number: 09424525
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Event-related media management system

An event-related media management system contextualizes media content. The event-related media management system associates media content with contextual event-related data to associate the media content with the events and information about the events. The contextual event-related data can then be used to provide access to the media content, such as through relevant search results or by presenting the media content in organized displays for contextual browsing and navigation. In some embodiments the event-related media management system generates contextualized media content for contextual search, discovery, and advertising.

  • Pub Date: 2015/18/11
  • Number: 09477744
  • Owner: Uberfan, LLC
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking a vehicle using an unmanned aerial vehicle

Tracking a vehicle using an unmanned aerial vehicle is disclosed. One or more first images may be received from a first camera of the first unmanned aerial vehicle located at a first location. A unique identifier of a first vehicle may be determined to be not identifiable in at least one of the one or more first images. The first unmanned aerial vehicle may be then repositioned. One or more second images having the second field of view and showing the first vehicle may then be received. The unique identifier of the first vehicle may then be determined based on at least one of the one or more second images.

  • Pub Date: 2015/17/11
  • Number: 09489839
  • Owner: Cloudparc, Inc.
  • Location: Great Neck, US
  • Details: Visit USPTO

Visit USPTO Page


Network classification

Network DNA may be determined for a computer network that taxonomically classifies the computer network. Network DNA may include derived network DNA components and raw network DNA components. Raw network DNA components may be acquired from local or remote sources. Derived network DNA components may be generated according to derived network DNA component specifications. Derived network DNA component specifications may reference raw network DNA components. Network DNA determined for the computer network may include a network species component capable of indicating network species classifications for computer networks. Network species classifications may include enterprise network, home network and public place network. Network species classifications may be determined as a function of network security, network management and network addressing. One or more network DNA stores may be configured to store network DNA for computer networks. Network DNA stores may store network DNA history as well as current network DNA.

  • Pub Date: 2015/17/11
  • Number: 09608883
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Managing notifications pushed to user devices

In one embodiment, a first computing device determines a priority of a communication to be pushed to a second computing device. The priority of the communication is based on a relevance score of the communication with respect to a user of the second computing device. The first computing device sends the communication via a push notification to the second computing device if the priority exceeds a predetermined threshold. The push notification itself comprises the priority of the communication, and the push notification is received by a secondary processor of the second computing device.

  • Pub Date: 2015/17/11
  • Number: 09628577
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Allocation enforcement in a multi-tenant cache mechanism

Cache optimization. Cache access rates for tenants sharing the same cache are monitored to determine an expected cache usage. Factors related to cache efficiency or performance dictate occupancy constraints. A request to increase cache space allocated to a first tenant is received. If there is a second cache tenant for which reducing its cache size by the requested amount will not violate the occupancy constraints for the second cache tenant, its cache is decreased by the requested amount and allocated to satisfy the request. Otherwise, the first cache size is increased by allocating the amount of data storage space to the first cache tenant without deallocating the same amount of data storage space allocated to another cache tenant from among the plurality of cache tenants.

  • Pub Date: 2015/17/11
  • Number: 09330000
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection

A decryption scheme for recover of a decrypted object without a cryptographic key is described. First, logical operation(s) are conducted on data associated with a first data string expected at a first location within an object having the predetermined format and data within the encrypted object at the first location to recover data associated with a portion of a cryptographic key from the encrypted object. Thereafter, logical operation(s) are conducted on that data and a first portion of the encrypted object at a second location to produce a result. Responsive to the result including data associated with the plaintext version of the second data string, logical operation(s) are conducted on a second portion of the encrypted object and the data associated with the plaintext version of the second data string to recover data associated with the cryptographic key. Thereafter, the encrypted object may be decrypted using the cryptographic key.

  • Pub Date: 2015/16/11
  • Number: 09560059
  • Owner: FireEye, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for short message services to an instant messaging conversion

Implementations of the present disclosure involve systems and methods for federating communications between a first network that transmits and receives messages formatted in a first format and a second network that transmits and receives messages formatted in a second format. The systems and methods are configured to receive a message from the first network formatted in the first format. The system then converts the message into a unified format that may be sent to the second network. After receiving the message in the unified format, the message may then be converted into the format of the second network and sent on the second network like any other message on the second network.

  • Pub Date: 2015/16/11
  • Number: 09445247
  • Owner: Vail Systems, Inc.
  • Location: Deerfield, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a security asset manager

Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.

  • Pub Date: 2015/16/11
  • Number: 09503481
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Signed response to an abusive email account owner and provider systems and methods

Systems and methods for abusive email account detection and transmission of a signed response to an abusive email account owner and provider. The methods include receiving an email from a first email account on a second email account, wherein the email contains malicious content, determining if a trust relationship exists between a first email server corresponding to the first email account and a second email server corresponding to the second email account, and transmitting, using a hardware processor of the second email server, an alert email to the first email account corresponding to the trust relationship, wherein the alert email includes a digital signature and a secure field having an abusive category descriptor in an email header. The secure field may include an abusive category descriptor, for example transmitting spam, transmitting malware, transmitting phishing attempts, and committing fraud.

  • Pub Date: 2015/16/11
  • Number: 09635038
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Migrating middlebox state for distributed middleboxes

A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller configures, in a first host, a first middlebox instance to receive a notification from a migration module before a virtual machine (VM) running in the first host migrates to a second host and to send middlebox state related to the VM to the migration module.

  • Pub Date: 2015/16/11
  • Number: 09552219
  • Owner: NICIRA, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Converting a text sentence to a series of images

A text sentence is automatically converted to an image sentence that conveys semantic roles of the text sentence. This is accomplished by identifying semantic roles associated with each verb of a sentence, any associated verb adjunctions, and identifying the grammatical dependencies between words and phrases in a sentence, in some embodiments. An image database, in which each image is tagged with descriptive information corresponding to the image depicted, is queried for images corresponding to the semantic roles of the identified verbs. Unless a single image is found to depict every semantic role, the text sentence is split into two smaller fragments. This process is the repeated and performed recursively until a number of images have been identified that describe each semantic role of each sentence fragment.

  • Pub Date: 2015/16/11
  • Number: 09633048
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Call-termination-triggered social interface

Methods and systems directed to a call-termination triggered social interface that leverages information associated with an incoming phone number for display to a user of a mobile device post-call and permits the user to conveniently issue commands to the mobile device or social networking system to take specific actions for the number or entity associated with the number on the social network.

  • Pub Date: 2015/16/11
  • Number: 09407691
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for performing data validation

Described are techniques for processing a request from a client for performing an operation that is received by a business logic provider. First processing is performed by the business logic provider to process the request that includes communicating with other providers for information in connection with the request, performing validation processing using the information obtained from the other providers to determine whether one or more restrictions are violated, each of said one or more restrictions identifying a required state of one or more objects for performing an operation of the request, determining whether any restrictions are violated, and performing one or more actions responsive to determining that any restrictions are violated.

  • Pub Date: 2015/13/11
  • Number: 09495409
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Referencing change(s) in data utilizing a network resource locator

The subject disclosure relates to techniques for referencing a change in data utilizing a network resource locator. An interface component can receive one or more requests that are associated with a data set from a client, and send, based on the one or more requests, a network resource locator and at least one portion of the data set to the client. Further, a data service component can compute a parameter that is associated with a change of the data set, and include the parameter in the network resource locator. In other embodiments, the data service component can receive a request utilizing the network resource locator, determine the change of the data set based on the parameter, and send the change of the data set to the client.

  • Pub Date: 2015/13/11
  • Number: 09537977
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Layered multicast and fair bandwidth allocation and packet prioritization

Embodiments include an overlay multicast network. The overlay multicast network may provide a set of features to ensure reliable and timely arrival of multicast data. The embodiments include a congestion control system that may prioritize designated layers of data within a data stream over other layers of the same data stream. Each data stream transmitted over the network may be given an equal share of the bandwidth. Addressing in routing tables maintained by routers may utilize summarized addressing based on the difference in location of the router and destination address. Summarization levels may be adjusted to minimize travel distances for packets in the network. Data from high priority data stream layers may also be retransmitted upon request from a destination machine to ensure reliable delivery of data.

  • Pub Date: 2015/13/11
  • Number: 09503763
  • Owner: Blitz Stream Video, LLC
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Enhancing video conferences

Implementations generally relate to enhancing video conferences. In some implementations, a method includes determining one or more characteristics of a video stream provided by a first camera. The method further includes determining one or more functions of the first camera based on the one or more characteristics. The method further includes enabling a browser to control the one or more functions of the first camera, and wherein the browser is remote relative to the first camera.

  • Pub Date: 2015/13/11
  • Number: 09661208
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Object store architecture for distributed data processing system

Embodiments described herein provide an object store that efficiently manages and services objects for use by clients of a distributed data processing system. Illustratively, the object store may be embodied as a quasi-shared storage system that interacts with nodes of the distributed data processing system to service the objects as blocks of data stored on a plurality of storage devices, such as disks, of the storage system. To that end, an architecture of the object store may include an on-disk layout, e.g., of the storage system, and an incore layout, e.g., of the nodes, that cooperate to illustratively convert the blocks to objects for access by the clients.

  • Pub Date: 2015/12/11
  • Number: 09582213
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Dither directed LUT output value interpolation

In an example, a method for image processing may include inputting a first pixel value corresponding to a first pixel of an image into a LUT. The LUT may map one or more LUT input values to one or more LUT output values. The first pixel value may correspond to a first LUT input value that maps to a first LUT output value in the LUT. The first pixel may include one or more pixel values. The method may include generating a noise value for the first LUT input value. The method may include generating a first interpolated LUT output value for the first LUT input value based on the noise value. The method may include transforming the image into a transformed image using the first interpolated LUT output value.

  • Pub Date: 2015/12/11
  • Number: 09639920
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Tamper-resistant non-volatile memory device

A non-volatile memory device includes a memory cell array including memory cells, a read circuit that, in operation, obtains pieces of resistance value information each relating to the resistance value of one of the memory cells, an arithmetic circuit that, in operation, calculates a binary reference value based on at least a part of the pieces of resistance value information, and a data adjustment circuit. In operation, the read circuit assigns, based on the binary reference value, 0 or 1 to each of the pieces of resistance value information. In operation, the data adjustment circuit determines whether to adjust the binary reference value, in accordance with a difference between the numbers of pieces of digital data “0” and digital data “1” in the pieces of digital data.

  • Pub Date: 2015/11/11
  • Number: 09548113
  • Owner: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Tamper-resistant non-volatile memory device comprising an arithmetic circuit that, in operation, calculates a binary reference value based on at least a part of the pieces of resistance value information, a read circuit that, in operation, selectively assigns, based on the binary reference value, one of two values to each of the pieces of resistance value information, and a write circuit that, in operation, performs a write operation corresponding to one of the two values among memory cells

A non-volatile memory device includes a memory cell array including memory cells, each having a resistance value reversibly transitioning among resistance value ranges, a read circuit that, in operation, obtains pieces of resistance value information each relating to the resistance value of one of the memory cells, an arithmetic circuit that, in operation, calculates a binary reference value based on at least a part of the pieces of resistance value information, and a write circuit. In operation, the read circuit selectively assigns, based on the binary reference value, one of two values to each of the pieces of resistance value information. In operation, the write circuit performs a first write operation on a memory cell corresponding to one of the two values among the memory cells.

  • Pub Date: 2015/11/11
  • Number: 09653161
  • Owner: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and apparatuses for implementing cross organizational data sharing

In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for example, means for storing customer organization data in a database of the host organization; allocating at least a sub-set of the customer organization data to be shared as shared data; configuring a hub to expose the shared data to a proxy user and configuring the proxy user at the hub with access rights to the shared data; configuring one or more spokes with access rights to the shared data of the hub via the proxy user; receiving a request from one of the hubs for access to the shared data of the customer organization via the proxy user at the hub; and returning a response to the hub having made the request. Other related embodiments are disclosed.

  • Pub Date: 2015/10/11
  • Number: 09646169
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, apparatus, and processes for using smart learning tools with touchscreen devices

Systems, methods, and non-transitory computer-readable media can receive a first user-provided topic among a plurality of user-provided topics. Topic-based information related to the first user-provided topic is received. The first user-provided topic is assigned to a first game wheel segment among a plurality of game wheel segments. The plurality of game wheel segments define a game wheel. The first user-provided topic is selected based on a spinning of the game wheel. A problem based on the topic-based information is presented.

  • Pub Date: 2015/10/11
  • Number: 09600592
  • Owner: We The Smart Finger Puppet
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing access to available agent

The availability of one or more agents of an institution to communicate with a user may be determined and reported to the user. An application on a user computing device may provide an indication as to how many agents are currently available to speak with the user and/or a wait time until an agent becomes available. The user computing device may display a call icon that the user may select to place a call to an available agent. The user computing device may display a call icon that the user may select to receive a callback from an available agent. Call volume statistics may be provided to the user and may be used to determine when an agent is most likely unavailable and/or most likely available.

  • Pub Date: 2015/10/11
  • Number: 09473638
  • Owner: United Services Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for implementing instant social image cobrowsing through the cloud

In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing instant social image cobrowsing through the cloud, including, for example, means for loading an application at the client device, the application displaying a graphical interface at the client device; receiving input at the graphical interface of the client device to initiate an instant share session; generating an action at the client device to request an instant share session; communicating the action from the client device to a remote host organization via a public Internet; receiving, at the client device, a pointer to a dynamically created co-browse site at the host organization responsive to communicating the action from the client device to the remote host organization; following the pointer to the dynamically created co-browse site at the host organization communicably linking the client device with the host organization; and exchanging a video telephony stream between the client device and a remote party through the dynamically created co-browse site. Other related embodiments are disclosed.

  • Pub Date: 2015/10/11
  • Number: 09444857
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for context based image compression

Techniques for compressing images based on context are provided. A first image and a second image may be identified for display on a client device. One or more contexts of the first image may be identified. One or more contexts of the second image may be identified. A first image quality for the first image may be determined based on the one or more contexts of the first image. A second image quality for the second image may be determined based on the one or more contexts of the second image. The first image may be compressed at the first image quality and the second image at the second image quality. The compressed first image and the compressed second image may be transmitted to the client device.

  • Pub Date: 2015/10/11
  • Number: 09466126
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for efficient coupling of cabling in a multi-cable rack-mounted environment

Systems, apparatuses, and methods for efficiently decoupling and recoupling various groupings of computer-network cabling in computer network environments using one or more multi-port, rapid-connect brackets. A multi-port, rapid-connect bracket may include individual interfaces for patch cables to be seated for coupling to a network device. The rapid-connect bracket may further include one or more actuating arms for maneuvering several connectors at once in order to release each individual connector from a seated engagement with the network device. In this manner, the entire rapid connect bracket is removed from being engaged with the device while the individual patch cables remain seated in the bracket itself. Once removed from the network device, the bracket maintains the position of each patch cable such that the bracket may be recoupled to a new network device.

  • Pub Date: 2015/10/11
  • Number: 09640898
  • Owner: NetSuite Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Providing a multi-tenant knowledge network

A computing system includes memory storing executable instructions and one or more processors operatively connected to the memory. The one or more processors execute the executable instructions to effectuate a method. The method may include (i) analyzing raw data obtained from a plurality of different data sources in order to identify one or more data structures of the raw data and to tag data identifying at least one of the plurality of different data sources; and (ii) generating a plurality of Universal Data Model (UDM) constructs. Each UDM construct may be based at least in part on the identified data structure(s) of the raw data. Each UDM construct may exclude the tagged data identifying at least one of the plurality of different data sources. Each UDM construct may organize the raw data into a particular arrangement of rows and columns.

  • Pub Date: 2015/10/11
  • Number: 09607056
  • Owner: CROSS COMMERCE MEDIA, INC.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and computer program products for an application execution container for managing secondary application protocols

A virtual application container can manage a plurality of secondary applications using a graphical user interface (GUI). The secondary applications may be selectively downloadable by a user and/or provided by third-party external providers. The application execution container may include a common feature or services interface that is used by the secondary applications that are executed in the GUI, which may include user verification and/or authentication information. The application execution container may include security and control functions that may be used by external service providers to ensure that users are properly authenticated, and the ability to add and/or utilize individual secondary applications may be granted based on predetermined eligibility criteria.

  • Pub Date: 2015/10/11
  • Number: 09641529
  • Owner: Coastal Federal Credit Union
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Immersive video teleconferencing robot

A method includes receiving, at a mobile teleconferencing robot, a remote user input to alter a viewing state of a vision system of the robot. The vision system includes a forward imaging sensor arranged to capture a forward video feed, a right imaging sensor arranged to capture a right video feed, and a left imaging sensor arranged to capture a left video feed, each with respect to a forward drive direction of the mobile teleconferencing robot. The method includes altering the viewing state of the vision system by adjusting a tilt angle and/or a zoom level of the forward imaging sensor based on the remote user input and generating a combined video feed that provides an immersive peripheral view about the robot. The combined video feed is generated by combining the forward video feed with a portion of the right video feed and a portion of the left video feed.

  • Pub Date: 2015/10/11
  • Number: 09479732
  • Owner: iRobot Corporation
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Best practice analysis, migration advisor

Embodiments of the present disclosure are directed to, among other things, providing resource allocation advice, configuration recommendations, and/or migration advice regarding data storage, access, placement, and/or related web services. In some examples, a web service may utilize or otherwise control a client instance to control, access, or otherwise manage resources of a distributed system. Based at least in part on one or more resource usage checks and/or configuration checks, resource usage information and/or configuration information of an account utilizing a web service, and/or user preferences and/or settings, resource allocation advice, system configuration recommendations, and/or migration advice may be provided to a user of an account. Additionally, in some examples, one or more remediation operations may be performed automatically.

  • Pub Date: 2015/10/11
  • Number: 09455871
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for verification of identity and location

Techniques for verifying identity and/or location of a customer. One embodiment involves receiving a customer-provided address from a customer in a communication via a computer network or telephone network. The customer is a person or entity paying to receive calls from a resident of a controlled access residential institution. The embodiment further involves accessing a computer system to identify location information associated with the customer, the location information derived from additional information within or about the communication and determining a reliability estimate of the customer-provided address by comparing the customer-provided address with the location information associated with the customer that was identified based on the additional information. The embodiment may involve notifying a telecommunications provider, the controlled access residential institution, or law enforcement based on the reliability estimate of the customer-provided address.

  • Pub Date: 2015/09/11
  • Number: 09558479
  • Owner: CONFINEMENT TELEPHONY TECHNOLOGY, LLC
  • Location: Greensboro, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for adaptive integration of hardware and software lock elision techniques

Particular techniques for improving the scalability of concurrent programs (e.g., lock-based applications) may be effective in some environments and for some workloads, but not others. The systems described herein may automatically choose appropriate ones of these techniques to apply when executing lock-based applications at runtime, based on observations of the application in the current environment and with the current workload. In one example, two techniques for improving lock scalability (e.g., transactional lock elision using hardware transactional memory, and optimistic software techniques) may be integrated together. A lightweight runtime library built for this purpose may adapt its approach to managing concurrency by dynamically selecting one or more of these techniques (at different times) during execution of a given application. In this Adaptive Lock Elision approach, the techniques may be selected (based on pluggable policies) at runtime to achieve good performance on different platforms and for different workloads.

  • Pub Date: 2015/09/11
  • Number: 09619281
  • Owner: Oracle International Corporation
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for integrating VoIp client for audio conferencing

Aspects of the present disclosure disclose system, apparatus and methods for providing an integrated web conferencing. In various aspects, the disclosure is directed to integrating a VoIP client for audio conferencing with a web client. In particular, the system provides for integrating a web portion of a web conference with an audio portion of the web conference. More specifically, the system, apparatus and methods provide for connecting a VoIP client to an audio conferencing portion of the system to facilitate communications between client and server.

  • Pub Date: 2015/09/11
  • Number: 09497236
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for indexing automated telephone systems

A telephone subnet crawler is used to access automated telephone response systems and index the information, contents and structure contained therein. A database of the information, contents and structure of a plurality of automated telephone response systems is created by the telephone subnet crawler. A user interface provides callers with direct access to the information, contents and structure of the automated telephone response systems contained in the database. Where an automated telephone response system requires user input, the user interface calls the automated telephone response system and navigates to the node requiring user input, provides the user input and displays the results to the user. Where an automated telephone response system connects to an operator, the user interface calls the automated telephone response system, navigates to the node for an operator, and when an operator is detected, calls the user at a user provided callback number.

  • Pub Date: 2015/09/11
  • Number: 09509844
  • Owner: FonCloud, Inc.
  • Location: Toronto, CA
  • Details: Visit USPTO

Visit USPTO Page


Multi-sized data types for managed code

Embodiments are directed towards generating applications that include multi-sized types running in managed code. During the compilation of an intermediate language version of an application, if a multi-size type is encountered, a runtime engine may perform actions to process the multi-size types. Accordingly, architecture information associated with the target computer may be determined. Data types corresponding to the architecture of the target computer and the multi-sized types may be determined based on the architecture information. Native code calls associated with an intermediate language code calls may be determined such that the parameters of the native code calls match the architecture dependent data types. And, a machine code version of the intermediate language code call may be generated. The generated machine code version of the intermediate language code may be executed with the data types specific to the target computer.

  • Pub Date: 2015/09/11
  • Number: 09459847
  • Owner: Xamarin Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and computer program products for collecting storage resource performance data using file system hooks

Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a location for a function dispatch table, and modifying the function dispatch table to redirect a request for an operation. In response to a received request for the operation, an intent to perform the operation is recorded to estimate an operational queue length, and data associated with the operation is recorded in a hash table. In response to recording data associated with the operation, a function corresponding to the operation to perform the operation is invoked. Elapsed time and storage size is recorded.

  • Pub Date: 2015/09/11
  • Number: 09641413
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing interactive communications campaigns with call pacing

A Web-based hosted system through which business entities create and manage communications campaigns. The system carries out a communications campaign on behalf of a client. A campaign is a series of calls to a contact list using one or more sub-campaigns. A sub-campaign associates a list of contacts, a script, and a timeframe. An agent typically is a contact center operator. A skill group is a set of agents that are trained to handle a given script. Call pacing enhancements are implemented to allow simultaneous progress on multiple sub-campaigns under a skill group. The techniques enable control over the pacing of individual sub-campaigns when multiple sub-campaigns are running under a single skill group. The service also provides a framework by which a set of “pluggable” pacing models are provisioned and managed, preferably on a per-model basis.

  • Pub Date: 2015/09/11
  • Number: 09635182
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Ion focusing

The invention generally relates to apparatuses for focusing ions at or above ambient pressure and methods of use thereof. In certain embodiments, the invention provides an apparatus for focusing ions that includes an electrode having a cavity, at least one inlet within the electrode configured to operatively couple with an ionization source, such that discharge generated by the ionization source is injected into the cavity of the electrode, and an outlet. The cavity in the electrode is shaped such that upon application of voltage to the electrode, ions within the cavity are focused and directed to the outlet, which is positioned such that a proximal end of the outlet receives the focused ions and a distal end of the outlet is open to ambient pressure.

  • Pub Date: 2015/09/11
  • Number: 09548192
  • Owner: Purdue Research Foundation
  • Location: West Lafayette, US
  • Details: Visit USPTO

Visit USPTO Page


Allocation enforcement in a multi-tenant cache mechanism

Cache optimization. Cache access rates for tenants sharing the same cache are monitored to determine an expected cache usage. Factors related to cache efficiency or performance dictate occupancy constraints. A request to increase cache space allocated to a first tenant is received. If there is a second cache tenant for which reducing its cache size by the requested amount will not violate the occupancy constraints for the second cache tenant, its cache is decreased by the requested amount and allocated to satisfy the request. Otherwise, the first cache size is increased by allocating the amount of data storage space to the first cache tenant without deallocating the same amount of data storage space allocated to another cache tenant from among the plurality of cache tenants.

  • Pub Date: 2015/09/11
  • Number: 09330012
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for wound treatment

The present disclosure relates to methods for identifying proteins or peptide motifs of intracellular, extracellular, or extracellular matrix proteins specifically exposed in wound sites, as well as compositions for treating wounds, and methods for their use.

  • Pub Date: 2015/06/11
  • Number: 09387253
  • Owner: Leidos, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Method for encapsulating a chalcogenide material

Methods of depositing silicon nitride encapsulation layers by atomic layer deposition over memory devices including chalcogenide material are provided herein. Methods include using iodine-containing silicon precursors and depositing thermally using ammonia or hydrazine as a second reactant, or iodine-containing silicon precursors and depositing using a nitrogen-based or hydrogen-based plasma.

  • Pub Date: 2015/06/11
  • Number: 09601693
  • Owner: Lam Research Corporation
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for publishing and implementing wireless application

Embodiments of the present application relate to a method of publishing a wireless application, a method of implementing a wireless application, a device for publishing a wireless application, a device for implementing a wireless application, and a computer program product for publishing a wireless application. A method of publishing a wireless application is provided. The method includes integrating a permanent interface layer of a software development kit (SDK) into a wireless application, publishing the integrated wireless application, and installing the dynamic implementation layer of the SDK onto a server. The SDK includes the permanent interface layer and a dynamic implementation layer, the permanent interface layer including an interface protocol to be invoked by the wireless application and the dynamic implementation layer including an interface implementation corresponding to the interface protocol.

  • Pub Date: 2015/06/11
  • Number: 09513891
  • Owner: Alibaba Group Holding Limited
  • Location: , KY
  • Details: Visit USPTO

Visit USPTO Page


Location-based place determination using online social networks

In one embodiment, a method includes, by one or more computing devices of an online social network, receiving, from a mobile-client system of a first user of the online social network, geographic-location information associated with the mobile-client system. The method further includes identifying multiple candidate place-entities associated with the online social network that correspond to the geographic-location information, where each candidate place-entity is associated with a particular geographic location. The method also includes determining, for each candidate place-entity, a confidence score based on the geographic-location information associated with the mobile-client system and a location-probability distribution associated with the candidate place-entity, where the confidence score represents a probability that the first user is located at the candidate place-entity. The method also includes sending, to the mobile-client system of the first user, information associated with one or more of the candidate place-entities having a confidence score above a threshold confidence score.

  • Pub Date: 2015/06/11
  • Number: 09602965
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


End-to-end policy enforcement in the presence of a traffic midpoint device

A global manager computer generates management instructions for a particular managed server within an administrative domain according to a set of rules. A global manager computer identifies a traffic midpoint device through which the provider managed server provides a service to a user device. The global manager determines a relevant rule from the set of rules that is applicable to communication between the provider managed server and the user device and generates a backend rule that is applicable to communication between the provider managed server and the traffic midpoint device. The global managed generates a backend function-level instruction including a reference to an actor-set authorized to communicate with the provider managed server to use the service. The global manager sends the backend function-level instruction to the provider managed server to configure the provider managed server to enforce the backend rule on communication with the actor-set including the traffic midpoint device.

  • Pub Date: 2015/06/11
  • Number: 09509574
  • Owner: Illumio, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic injection device

A method for treating a disorder using an automatic injection device is disclosed. The device includes a syringe movably disposed in a housing and including a barrel portion, a needle and a bung for sealing the barrel portion. The device includes a syringe actuation component for moving the syringe towards a first open end of the housing such that the needle projects from the first end, and for subsequently applying pressure to the bung. The syringe actuation component includes a pressurizer, a rod comprising a compressible portion projecting therefrom, and a flange between a second end of the rod and the compressible portion. The device also includes a biasing mechanism for biasing the syringe actuation component towards the first open end of the housing, the biasing mechanism disposed about the second end of the rod between the flange and a second end of the housing.

  • Pub Date: 2015/06/11
  • Number: 09486584
  • Owner: AbbVie Biotechnology Ltd.
  • Location: Hamilton, BM
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing group actions based on machine-readable codes

Systems, methods, and non-transitory computer-readable media can receive from a user a machine-readable code associated with a group. The group can be identified based on the machine-readable code. A set of current members of the group can be identified. The user can be provided with access to the set of current members of the group. In some instances, an identifier for the user can be received. The user can be added, based on the identifier, to the set of current members of the group. The current members can be provided with access to the set of current members including the user.

  • Pub Date: 2015/05/11
  • Number: 09401956
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Service monitoring interface

Services in an operating environment are represented by stored service definitions that identify entities that perform the service. Entity definitions identify machine data pertaining to the entity. A key performance indicator (KPI) of the service characterizes the service on the whole or some aspect of it. Each KPI is defined by a search query that derives a value from machine data identified in the entity definitions. Processing devices cause display of a service-monitoring page having a services summary region and a services aspects region. The summary region displays interactive summary tiles that each correspond to a service and present information about an aggregate KPI that characterizes the service. The aspects region displays interactive aspect tiles that each correspond to a KPI characterizing some aspect of an associated service. Additional information may be included in the service-monitoring page and interaction features enable a user to navigate to enhanced information displays.

  • Pub Date: 2015/05/11
  • Number: 09590877
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Personal monitoring using a remote timer

Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes logging in, through a network accessible device, a geo position of a subject to initiate a monitored session associated with the subject. A countdown timer of a remote server is initiated to denote a monitored time interval, the remote server in communication with the network accessible device over a network. A notification is generated and transmitted across the network to a monitoring device responsive to a conclusion of the monitored time interval.

  • Pub Date: 2015/05/11
  • Number: 09438682
  • Owner: Real Agent Guard-IP, LLC
  • Location: Rogers, US
  • Details: Visit USPTO

Visit USPTO Page


Machine-learning systems and techniques to optimize teleoperation and/or planner decisions

A system, an apparatus or a process may be configured to implement an application that applies artificial intelligence and/or machine-learning techniques to predict an optimal course of action (or a subset of courses of action) for an autonomous vehicle system (e.g., one or more of a planner of an autonomous vehicle, a simulator, or a teleoperator) to undertake based on suboptimal autonomous vehicle performance and/or changes in detected sensor data (e.g., new buildings, landmarks, potholes, etc.). The application may determine a subset of trajectories based on a number of decisions and interactions when resolving an anomaly due to an event or condition. The application may use aggregated sensor data from multiple autonomous vehicles to assist in identifying events or conditions that might affect travel (e.g., using semantic scene classification). An optimal subset of trajectories may be formed based on recommendations responsive to semantic changes (e.g., road construction).

  • Pub Date: 2015/05/11
  • Number: 09632502
  • Owner: Zoox, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Invariant biohash security system and method

Systems, methods, and program products for providing secure authentication for electronic messages are disclosed. A method may comprise generating an asymmetric private key based at least in part upon an invariant biometric feature vector derived from an input biometric reading. The private key may be further based at least in part upon a user password. The resulting private key may not be stored but rather may be generated when required to authenticate an electronic message, at which time it may be used to provide a digital signature for the electronic message. The private key may be deleted after use. The private key may be regenerated by inputting both a new instance of the biometric reading as well as a new instance of the password.

  • Pub Date: 2015/05/11
  • Number: 09374370
  • Owner: ISLAND INTELLECTUAL PROPERTY, LLC
  • Location: Manhasset, US
  • Details: Visit USPTO

Visit USPTO Page


Immunoregulatory agents

Compounds that modulate the oxidoreductase enzyme indoleamine 2,3-dioxygenase, and compositions containing the compounds, are described herein. The use of such compounds and compositions for the treatment and/or prevention of a diverse array of diseases, disorders and conditions, including cancer- and immune-related disorders, that are mediated by indoleamine 2,3-dioxygenase is also provided.

  • Pub Date: 2015/05/11
  • Number: 09643972
  • Owner: Flexus Biosciences, Inc.
  • Location: Princeton, US
  • Details: Visit USPTO

Visit USPTO Page


Teleoperation system and method for trajectory modification of autonomous vehicles

Various embodiments relate generally to autonomous vehicles and associated mechanical, electrical and electronic hardware, computer software and systems, and wired and wireless network communications to provide an autonomous vehicle fleet as a service. More specifically, systems, devices, and methods are configured to initiate modification of trajectories to influence navigation of autonomous vehicles. In particular, a method may include receiving a teleoperation message via a communication link from an autonomous vehicle, detecting data from the teleoperation message specifying an event associated with the autonomous vehicle, identifying one or more courses of action to perform responsive to detecting the data specifying the event, and generating visualization data to present information associated with the event to a display of a teleoperator computing device.

  • Pub Date: 2015/04/11
  • Number: 09507346
  • Owner: Zoox, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomous vehicle fleet service and system

Various embodiments relate generally to autonomous vehicles and associated mechanical, electrical and electronic hardware, computer software and systems, and wired and wireless network communications to provide an autonomous vehicle fleet as a service. In particular, a method may include monitoring a fleet of vehicles, at least one of which is configured to autonomously transit from a first geographic region to a second geographic region, detecting data indicating an event associated with the vehicle having a calculated confidence level, receiving data representing a subset of candidate trajectories responsive to detecting the event, which is associated with a planned path for the vehicle, identifying guidance data to select from one or more of the candidate trajectories as a guided trajectory, receiving data representing a selection of a candidate trajectory, and transmitting the selection of the candidate trajectory as of the guided trajectory to the vehicle.

  • Pub Date: 2015/04/11
  • Number: 09606539
  • Owner: Zoox, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive mapping to navigate autonomous vehicles responsive to physical environment changes

Various embodiments relate generally to autonomous vehicles and associated mechanical, electrical and electronic hardware, computer software and systems, and wired and wireless network communications to provide map data for autonomous vehicles. In particular, a method may include accessing subsets of multiple types of sensor data, aligning subsets of sensor data relative to a global coordinate system based on the multiple types of sensor data to form aligned sensor data, and generating datasets of three-dimensional map data. The method further includes detecting a change in data relative to at least two datasets of the three-dimensional map data and applying the change in data to form updated three-dimensional map data. The change in data may be representative of a state change of an environment at which the sensor data is sensed. The state change of the environment may be related to the presence or absences of an object located therein.

  • Pub Date: 2015/04/11
  • Number: 09612123
  • Owner: Zoox, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for determining a handoff profile between telecommunications networks

Techniques are disclosed for evaluating an ongoing VoIP call over a combination of IP data communication network connections for purposes of determining when to hand it off to a circuit-switched cellular network connection. Multiple IP stream call quality values X1(i), X2(i), and Xb(i) are sampled over a time period (N) of (j) samples for an ongoing telephone call and stored. Instantaneous annoyance values a1(j), a2(j), and ab(j) for each of the stored call quality values for each of the IP streams within sampled time period (N) are calculated. Current accumulated annoyance values A1(i), A2(i), and Ab(i) are obtained by summing the instantaneous annoyance values a(j) for each IP network. The combined IP stream accumulated annoyance values Ab(i) is compared to a handoff threshold values Hb(i). A handoff of the telephone call a circuit-switched cellular communication link is initiated when the accumulated annoyance value Ab(i) is greater than the handoff threshold value Hb(i).

  • Pub Date: 2015/03/11
  • Number: 09288731
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for enhancing locative response abilities of autonomous and semi-autonomous agents

A computer system and method according to the present invention can receive multi-modal inputs such as natural language, gesture, text, sketch and other inputs in order to simplify and improve locative question answering in virtual worlds, among other tasks. The components of an agent as provided in accordance with one embodiment of the present invention can include one or more sensors, actuators, and cognition elements, such as interpreters, executive function elements, working memory, long term memory and reasoners for responses to locative queries, for example. Further, the present invention provides, in part, a locative question answering algorithm, along with the command structure, vocabulary, and the dialog that an agent is designed to support in accordance with various embodiments of the present invention.

  • Pub Date: 2015/03/11
  • Number: 09542930
  • Owner: Knexus Research Corporation
  • Location: Oxon Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Control arrangement arranged to control an autonomous vehicle, autonomous drive arrangement, vehicle and method

A vehicle, method, control arrangement, and autonomous drive arrangement are provided. The control arrangement is for controlling an autonomous drive arrangement in a host vehicle including an autonomous drive arrangement configured to control steering and velocity of the host vehicle up to an autonomous drive maximum velocity of the host vehicle, a speed limit determination unit, and a communication unit arranged to receive, from at least one external source, real time preceding vehicle velocity for one or more preceding vehicles. The control arrangement is configured to control the autonomous drive arrangement in dependence on a difference between the autonomous drive maximum velocity and at least one of a speed limit and at least one preceding vehicle velocity.

  • Pub Date: 2015/03/11
  • Number: 09566983
  • Owner: Volvo Car Corporation
  • Location: Gothenburg, SE
  • Details: Visit USPTO

Visit USPTO Page


Adaptive battery life extension

According to one embodiment, a first battery number is determined representing a battery condition of a battery of a mobile device using a predictive model, where the predictive model is configured to predict future battery conditions based on a past battery usage of the battery. A second battery number is determined representing the battery condition using a drain model, where the drain model is configured to predict a future battery discharge rate based on a past battery discharge rate. A third battery number is determined representing the battery condition based on a current battery level corresponding to a remaining life of the battery at the point in time. Power management logic performs a power management action based on the battery condition derived from at least one of the first battery number, the second battery number and the third battery number.

  • Pub Date: 2015/03/11
  • Number: 09615333
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for optimizing testing of software production incidents

This disclosure relates generally to software testing, and more particularly to a system and method for optimizing testing of software production incidents. In one embodiment, the method comprises analyzing an incident ticket using a machine learning algorithm to identify one or more keywords in the incident ticket, and identifying a location of the incident ticket based on the one or more keywords, a test workspace corresponding to the incident ticket based on the location, and a plurality of specific test cases corresponding to the incident ticket based on the test workspace. The identification leads to a first scenario and a second scenario. In the first scenario, the method further comprises initiating a learning process based on intelligence gathered from a manual processing of the incident ticket. In the second scenario, the method further comprises executing the plurality of specific test cases in a test environment.

  • Pub Date: 2015/02/11
  • Number: 09582408
  • Owner: WIPRO LIMITED
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction

A registered provider device encrypts provider input related to a transaction between the provider device and one of many registered user devices to create an encrypted one-time-use provider code (the encryption is performed using an encryption key produced, in part, using a uniquely sequenced number generated by a sequencer maintained by the provider device). Similarly, the user device encrypts user input to create an encrypted one-time-use user code using an encryption key produced, in part, using a uniquely sequenced number generated by a user sequencer maintained by the user device. The provider and user devices independently transmit their different encrypted one-time-use codes to an intermediate entity, which decrypts the encrypted codes. This decryption is performed using one-time-use encryption keys produced using sequencers maintained by the intermediate entity, and this decryption generates an authorization request. The intermediate entity obtains an authorization decision regarding the authorization request from the authorization entity.

  • Pub Date: 2015/02/11
  • Number: 09558492
  • Owner: BENEDORETSE LLC
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Disaster recovery with a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing server is configured to respond to a failure in a conference bridge to allow for repair to the network and/or account for split conferences that may occur due to the bridge failure. In one embodiment, the CCRS may account for moving a conference bridge into an offline state by removing the conference bridge from consideration for hosting a collaboration conference.

  • Pub Date: 2015/02/11
  • Number: 09386053
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Device-based authentication for secure online access

Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is received from an online service. The authentication request may be associated with a login request received by the online service from a user. The authentication request may further indicate a list of device identifiers for computing devices connected to a provider network and previously designated by the user as authorized to access the online service. Communication logs collected from the provider network are analyzed to determine whether the login request originated from one of the authorized computing devices based on the list of device identifiers. If it is determined that the login request originated from one of the authorized computing devices, an indication is returned to the online service that the login request was received from an authorized computing device.

  • Pub Date: 2015/02/11
  • Number: 09426161
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Previewing parsed raw data using a graphical user interface

Embodiments are directed towards previewing results generated from indexing data raw data before the corresponding index data is added to an index store. Raw data may be received from a preview data source. After an initial set of configuration information may be established, the preview data may be submitted to an index processing pipeline. A previewing application may generate preview results based on the preview index data and the configuration information. The preview results may enable previewing how the data is being processed by the indexing application. If the preview results are not acceptable, the configuration information may be modified. The preview application enables modification of the configuration information until the generated preview results may be acceptable. If the configuration information is acceptable, the preview data may be processed and indexed in one or more index stores.

  • Pub Date: 2015/31/10
  • Number: 09442981
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Wearable monitor

The present disclosure relates to a wearable monitor device and methods and systems for using such a device. In certain embodiments, the wearable monitor records cardiac data from a mammal and extracts particular features of interest. These features are then transmitted and used to provide health-related information about the mammal.

  • Pub Date: 2015/30/10
  • Number: 09597004
  • Owner: iRhythm Technologies, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Toll-free telecommunications management platform

Methods and systems are provided for the management, routing and reporting of toll-free telecommunications calls and data. Methods and systems are provided for pre-populating a call routing template based on natural language inputs and populating telecommunications routing codes at nodes of a call routing decision tree to generate a call routing template that may be identified and presented to a user interface based at least in part on a natural language input.

  • Pub Date: 2015/30/10
  • Number: 09549066
  • Owner: Somos, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of providing speech processing in user interface

Disclosed are systems, methods and computer-readable media for enabling speech processing in a user interface of a device. The method includes receiving an indication of a field and a user interface of a device, the indication also signaling that speech will follow, receiving the speech from the user at the device, the speech being associated with the field, transmitting the speech as a request to public, common network node that receives and processes speech, processing the transmitted speech and returning text associated with the speech to the device and inserting the text into the field. Upon a second indication from the user, the system processes the text in the field as programmed by the user interface. The present disclosure provides a speech mash up application for a user interface of a mobile or desktop device that does not require expensive speech processing technologies.

  • Pub Date: 2015/30/10
  • Number: 09530415
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning work environments on personal mobile devices

A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to a privileged component of a host operating system of the personal mobile device, wherein the binding enables a software virtualization layer and a management service component of the mobile application to execute in a privileged mode. The mobile application is then able to download a virtual phone image for the business mobile device and security-related policy settings relating to use of the business mobile device from a mobile management server, wherein the software virtualization layer is able to launch a virtual machine for the business mobile device based on the virtual phone image. Once the virtual phone image has been downloaded, the management service component initiates a periodic attempt to establish a connection with the mobile management server to comply with the downloaded security-related policy settings.

  • Pub Date: 2015/30/10
  • Number: 09577985
  • Owner: VMWARE, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel migration of data objects to clustered storage

Data objects can be migrated, while live, to virtualized clustered storage arrays in an efficient manner to allow for efficient transition from non-clustered storage to the virtualized clustered storage arrays. A data migration specification indicates data objects to be migrated and parameters for the migration. The parameters include a source of a data object, a destination of the data object in the virtualized clustered storage arrays, and a transfer space. A migration engine validates and parses the data migration specification. For each unique association of source, destination, and transfer space, the migration engine instantiates a migration process that drives and monitors migration of the corresponding data object. The migration processes operate in parallel for migration of the specified data objects into the virtualized clustered storage arrays.

  • Pub Date: 2015/30/10
  • Number: 09503522
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Network security threat detection by user/user-entity behavioral analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

  • Pub Date: 2015/30/10
  • Number: 09516053
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Managing execution of programs by multiple computing systems

Techniques are described for managing the execution of programs on multiple computing systems, such as on virtual machine nodes executing on the computing systems. A program execution service may in some situations provide the multiple computing systems and manage the program execution on behalf of multiple customers or other users, including to select appropriate computing systems to execute one or more instances of a program for a user, such as based in part on configuration information specified by the user. The described techniques may further include managing communications between multiple intercommunicating computing nodes in some situations.

  • Pub Date: 2015/30/10
  • Number: 09621593
  • Owner: Amazon Technologies, Inc.
  • Location: Incline Village, US
  • Details: Visit USPTO

Visit USPTO Page


Interface having selectable, interactive views for evaluating potential network compromise

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

  • Pub Date: 2015/30/10
  • Number: 09609011
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


External storage manager for a data storage cell

A storage management solution according to certain embodiments is provided which decouples certain aspects of the storage manager from the data storage cell. The data storage system according to certain aspects can provide one or more external storage managers that manage data protection and administer the operation of data storage cells. According to certain aspects, usage of the decoupled storage manager can be allocated amongst multiple data storage cells, such as by data storage cells of multiple companies, sub-units of a company, or both.

  • Pub Date: 2015/30/10
  • Number: 09485311
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Event mini-graphs in data intake stage of machine data processing platform

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

  • Pub Date: 2015/30/10
  • Number: 09596254
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Dual-path distributed architecture for network security analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

  • Pub Date: 2015/30/10
  • Number: 09591010
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Bead manipulation techniques

The invention provides a method of redistributing magnetically responsive beads in a droplet. The method may include conducting on a droplet operations surface one or more droplet operations using the droplet without removing the magnetically responsive beads from the region of the magnetic field. The droplet operations may in some cases be electrode-mediated. The droplet operations may redistribute and/or circulate the magnetically responsive beads within the droplet. In some cases, the droplet may include a sample droplet may include a target analyte. The redistributing of the magnetically responsive beads may cause target analyte to bind to the magnetically responsive beads. In some cases, the droplet may include unbound substances in a wash buffer. The redistributing of the magnetically responsive beads causes unbound substances to be freed from interstices of an aggregated set or subset of the magnetically responsive beads.

  • Pub Date: 2015/30/10
  • Number: 09358551
  • Owner: ADVANCED LIQUID LOGIC, INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive gain control using sample-and-hold circuit for analog CDS

An image processing circuit includes a first sample-and-hold circuit that samples a first data from a pixel, a second sample-and-hold circuit that samples a second data from the pixel, a voltage-to-current circuit that includes a resistor and a current source and receives the first and second data to output a difference data, an adaptive gain control determination circuit that determines whether a rate of change of a signal from the pixel exceeds a threshold based on an output of the second sample-and-hold circuit, and a current-mode ADC that converts the difference data from an analog form to a digital form.

  • Pub Date: 2015/30/10
  • Number: 09661251
  • Owner: Sony Semiconductor Solutions Corporation
  • Location: Kanagawa, JP
  • Details: Visit USPTO

Visit USPTO Page


RFID loss-prevention using angle-of-arrival

An RFID loss-prevention system (LPS) permits authorized items to leave a facility and may perform a security action if an unauthorized item leaves the facility. A checkout reader first authorizes an item tagged with an RFID tag to exit a facility by reading an identifier from the tag, obtaining an exit authorization, and sending the identifier to a database. A reader system configured to direct at least two beams along a facility exit path reads tagged items exiting the facility, determines at least one of a travel direction and a tag location, and uses the determination to indicate that a tag is exiting or has exited the facility. The LPS then uses the database to determine if the exiting/exited tag is authorized to leave the facility.

  • Pub Date: 2015/29/10
  • Number: 09349032
  • Owner: IMPINJ, INC
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Providing indications of pairing between wireless devices

The technology described in this document can be embodied in a computer-implemented method that includes transmitting, from a first device over a wireless communication channel established between the first device and a second device, one or more signals. The one or more signals include information about an activation pattern for an output device on the second device. The method also includes transmitting, from the first device, at least one control signal to the second device to activate the output device in accordance with the activation pattern, and generating an output signal indicative of the activation pattern for presentation on the first device.

  • Pub Date: 2015/29/10
  • Number: 09635696
  • Owner: Bose Corporation
  • Location: Framingham, US
  • Details: Visit USPTO

Visit USPTO Page


Physical uplink control channel (PUCCH) resource allocation (RA) for a hybrid automatic retransmission re-quest-acknowledge (HARQ-ACK) transmission

A user equipment (UE) is disclosed. The UE can identify a downlink control channel. The UE can determine when the downlink control channel is an enhanced physical downlink control channel (EPDCCH). The UE can select an enhanced physical uplink control channel (PUCCH) resource allocation for a hybrid automatic retransmission re-quest-acknowledge (HARQ-ACK) transmission when the downlink control channel is the EPDCCH.

  • Pub Date: 2015/29/10
  • Number: 09608910
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Interprocessor memory status communication

In a transactional memory environment including a first processor and one or more additional processors, a computer-implemented method includes identifying a memory location and sending a probe request from the first processor to the additional processors. The probe request includes the memory location. The computer implemented method further includes generating, by each additional processor, an indication including whether the memory location is in use for a transaction by the additional processor. The computer-implemented method further includes sending the indication from each additional processor to the first processor and proceeding, by the first processor, based on the indication.

  • Pub Date: 2015/29/10
  • Number: 09563467
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Fabrication tools for exerting normal forces on feedstock

The present invention relates to tooling and methods for disposing, coating, building up, repairing, or otherwise modifying the surface of a metal substrate using frictional heating and compressive loading of a consumable metal material against the substrate. Embodiments of the invention include friction-based fabrication tooling comprising a non-consumable member with a throat and a consumable member disposed in the throat, wherein the throat is operably configured such that during rotation of the non-consumable member at a selected speed, the throat exerts normal forces on and rotates the consumable member at the selected speed; and comprising means for dispensing the consumable member through the throat and onto a substrate using frictional heating and compressive loading. Embodiments of the invention also include fabrication methods using the tools described herein.

  • Pub Date: 2015/29/10
  • Number: 09643279
  • Owner: AEROPROBE CORPORATION
  • Location: Christiansburg, US
  • Details: Visit USPTO

Visit USPTO Page


Connecting a printer and a mobile device using identification information printed by the printer

A computer-implemented method for pairing a point of sale printer with a client device, using two-way identification, is disclosed. The method comprises receiving, using the point of sale printer and a wireless communication protocol, a request to pair the point of sale printer. The method also comprises deriving, using the point of sale printer, the client device, and a device pairing protocol, a shared secret at the client device and the point of sale printer. The method also comprises printing, using the point of sale printer and upon deriving the shared secret, client device association information on a printout. The method also comprises receiving, using the client device and the printout, the client device association information. The method also comprises associating the point of sale printer and the client device using the client device association information as received using the client device.

  • Pub Date: 2015/29/10
  • Number: 09591175
  • Owner: Clover Network, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method for increasing cache size

A method for increasing storage space in a system containing a block data storage device, a memory, and a processor is provided. Generally, the processor is configured by the memory to tag metadata of a data block of the block storage device indicating the block as free, used, or semifree. The free tag indicates the data block is available to the system for storing data when needed, the used tag indicates the data block contains application data, and the semifree tag indicates the data block contains cache data and is available to the system for storing application data type if no blocks marked with the free tag are available to the system.

  • Pub Date: 2015/28/10
  • Number: 09519593
  • Owner: Hola Networks Ltd.
  • Location: Netanya, IL
  • Details: Visit USPTO

Visit USPTO Page


Method for connecting users with agents based on user values dynamically determined according to a set of rules or algorithms

A request is received for connecting a user with an agent, the request identifying a user interaction with content. A second server is accessed to determine a first score of the user representing a benefit the user has generated for a client that provides the content. A third server is accessed to determine a second score of the user representing overall burden to provide services to the user by the client based on an interaction history of the user with the client. A user value is dynamically determined based on the first score and the second score using a user value determination algorithm that is specifically configured for the client. A list of agent candidates is identified from a pool of agents based on the user value and the collection of real-time data. A first communication session is established between the user and one of the agent candidates.

  • Pub Date: 2015/28/10
  • Number: 09571649
  • Owner: TELETECH HOLDINGS, INC.
  • Location: Englewood, US
  • Details: Visit USPTO

Visit USPTO Page


Method for connecting a user with an agent based on user interaction of a link of a prior message exchanged between the user and the agent

A request is received from a user device to connect with an agent, the request including information describing an interactive event representing a user interaction with a link embedded within a first message presented at the user device. A user device ID identifying the user device is determined based on the request. The interactive event is examined to determine whether the interactive event satisfies a predetermined condition based on a set of one or more rules. In response to determining that the interactive event satisfies the predetermined condition, a first agent device ID is determined that identifies a first agent device of a first agent who initiated and sent the first message to the user device. A communication session is established between the user device and the first agent device based on the user device ID and the first agent device ID.

  • Pub Date: 2015/28/10
  • Number: 09350865
  • Owner: TELETECH HOLDINGS, INC.
  • Location: Englewood, US
  • Details: Visit USPTO

Visit USPTO Page


Filtering suggested structured queries on online social networks

In one embodiment, a method includes receiving an text query inputted by a first user from a client device of the first user, generating a set of structured queries based on the text query, each structured query in the set corresponding to a grammar of a context-free grammar model, wherein each structured query is based on a natural-language string generated by a grammar of the context-free grammar model and comprises one or more tokens, wherein one or more of the tokens of each structured query correspond to one or more objects associated with the online social network, respectively, filtering the set to remove one or more structured queries from the set, each removed structured query having a quality score less than a threshold quality score, and sending one or more of the structured queries from the post-filtered set to the client device of the first user for display.

  • Pub Date: 2015/28/10
  • Number: 09594852
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Configuring manifest files referencing infrastructure service providers for adaptive streaming video

Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is encoded at different reference bitrates and each encoded reference bitrate is divided into segments to generate video segment files. The manifest file includes an ordered list of universal resource locators (URLs) that reference a set of video segment files encoded at a particular reference bitrate. A source manifest file that indicates the set of video segment files is identified based on the request. An issued manifest file that includes a first URL and a second URL is generated based on the source manifest file. The first URL references a first domain and the second URL references a second domain that is different from the first domain. The issued manifest file is transmitted to the user device as a response to the request.

  • Pub Date: 2015/28/10
  • Number: 09509742
  • Owner: DLVR, INC.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Composite term index for graph data

This application is directed to an indexing system for graph data. In particular implementations, the indexing system uses a database index infrastructure that provides for flexible search capability to data objects and associations between data objects. Particular embodiments relate to an indexing system for storing and serving information modeled as a graph that includes nodes and edges that define associations or relationships between nodes that the edges connect in the graph.

  • Pub Date: 2015/28/10
  • Number: 09576060
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for monitoring calls to an application program interface (API) function

A method and device for monitoring calls to an application program interface (API) function includes monitoring for a memory permission violation of a computing device caused by the API function call. If a memory permission violation occurs, control of the computing device is transferred to a virtual machine monitor to intervene prior to execution of the API function. The virtual machine monitor may perform one or more actions in response to the API function call.

  • Pub Date: 2015/27/10
  • Number: 09495540
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Extended access barring

A system and method for authorizing access to a transmission station for a mobile device is disclosed. The mobile device can receive device extended access barring (EAB) configuration information in a broadcast control channel (BCCH) from a transmission station. The mobile device can bar the mobile device configured for EAB and having characteristics identified in the EAB configuration information for barring from accessing the transmission station. Alternatively, a system and method for barring a mobile device from accessing a transmission station is disclosed. The transmission station can receive from the mobile device a radio resource control (RRC) connection establishment request. The transmission station can configure a system information block (SIB) with extended access barring (EAB) configuration information. The transmission station can broadcast the SIB with EAB configuration information to the mobile device.

  • Pub Date: 2015/27/10
  • Number: 09615314
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-angiogenic molecules, nanostructures and uses thereof

The disclosure is generally directed toward the design and synthesis of peptide amphiphile (PA) molecules that comprises a peptide configured to inhibit angiogenesis. The peptide amphiphile comprises a hydrophobic tail, peptide sequence capable of beta-sheet formation; and a peptide, wherein the peptide is configured to inhibit angiogenesis. Optionally the PA further comprises a flexible linker between the peptide sequence capable of beta-sheet formation and the peptides. Further this disclosure is directed to nanostructures comprising peptide amphiphiles configured to inhibit angiogenesis.

  • Pub Date: 2015/27/10
  • Number: 09556232
  • Owner: Northwestern University
  • Location: Evanston, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic location search suggestions based on travel itineraries

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for retrieving local information on a user device include detecting itinerary information stored by a first application on a user device, and identifying a travel destination based on the detected itinerary information. The travel destination is communicated to a second application executable on a user device, and the travel destination is stored in association with the second application. The second application is adapted to retrieve local information based on an identified geographic location, and local information for the travel destination is provided through the second application in response to a user interaction with the second application and based on a triggering threshold associated with the itinerary information.

  • Pub Date: 2015/26/10
  • Number: 09471599
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive task assignment for online games that uses player profiles

Software at an online game website assigns to a player of a massively multiplayer online (MMO) game a first game task in a conditional series of game tasks. The assignment is based at least in part on a measure of difficulty associated with the first game task. The measure of difficulty depends on a profile associated with the player that includes an Active Social Network (ASN) metric as determined by data that has been read from an in-memory database and that has been retrieved from a social networking website through an application programming interface (API) exposed by the social networking website. Then the software provides a reward to the player upon termination of the conditional series of game tasks. The reward depends at least in part on the game tasks in the conditional series of game tasks that were completed by the player.

  • Pub Date: 2015/26/10
  • Number: 09604145
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing driver and vehicle analysis and alerting

Systems and methods are disclosed for collecting vehicle data from a vehicle engine computer of a vehicle and a plurality of sensors disposed about the vehicle and generating feedbacks for a driver of the vehicle using at least the vehicle data. The systems and methods additionally provide for receiving user inputs from the driver responding to the feedbacks so that the user inputs are associated with corresponding rule violations that triggered the feedbacks.

  • Pub Date: 2015/23/10
  • Number: 09424751
  • Owner: TELOGIS, INC.
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for executing custom fleet vehicle management scripts

System and methods are disclosed for gathering vehicle data from a vehicle engine computer installed in an engine of a vehicle and a plurality of sensors disposed about the vehicle and providing functionality for a third-party to install and then execute custom scripts within a telematics application to change default functionalities of the telematics application when processing the vehicle data.

  • Pub Date: 2015/23/10
  • Number: 09478076
  • Owner: TELOGIS, INC.
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


Restricted content publishing with search engine registry

A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage a plurality of entries stored in the content registry. The method may also include providing access to the plurality of entries by a pre-authorized search engine to the content registry in response to a search requested by an authorized requester.

  • Pub Date: 2015/23/10
  • Number: 09578012
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Query-aware compression of join results

A method is provided for compressing results of a join query. A join order of a result set is determined from the join query, where the result set includes a plurality of tuples. A plurality of dictionary entries for the result set is received. A nested hierarchy of dictionaries is created based on the join order and the dictionary entries. A plurality of encoded tuples is received. The nested hierarchy of dictionaries is used by a processor to decode the plurality of encoded tuples so as to produce the plurality of tuples of the result set.

  • Pub Date: 2015/23/10
  • Number: 09529853
  • Owner: Armonk Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for use in transferring an assignment of a secure chip between subscription managers

Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network operator (MNO) to a new SM of a new MNO are described. In one illustrative example, the current SM receives a request for transferring the assignment and produces transfer permission data in response. The transfer permission data includes an identifier of the secure chip, an identifier of the current SM, and a digital signature of the current SM. The current SM then sends to the secure chip a transfer permission message which includes the transfer permission data. The transfer permission data indicates a permission for the secure chip to transfer the assignment from the current SM to the new SM. Additional techniques are performed by the secure chip, and the new SM, as described.

  • Pub Date: 2015/23/10
  • Number: 09572016
  • Owner: Certicom Corp.
  • Location: Mississauga, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Geo-fenced event alerts

A method, computer program product, and computer system is provided. A processor identifies an event based, at least in part, on a first news article. A processor determines a first area of impact for the event based, at least in part, on the first news article. Responsive to a determination that a current location of a first user is within the first area of impact, a processor sends a first message to the first user based, at least in part, on the first news article.

  • Pub Date: 2015/23/10
  • Number: 09609479
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Familiar dynamic human challenge response test content

Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are directed to secure human challenge response test delivery services of configurable difficulty for user devices. One embodiment of the present invention is directed to methods and systems for implementing a familiar and dynamic human challenge response test challenge repository created from transaction data. The dynamic human challenge response test challenge repository may be created by a server computer receiving a plurality of transaction data. Challenge items may be extracted from the transaction data using an extraction algorithm. Furthermore, in some embodiments a challenge message may be sent to a requestor, a verification request may be received, and the verification request may be compared to the challenge message. Another embodiment may be directed at using user information in a human challenge response test to mutually authenticate a user and a service provider.

  • Pub Date: 2015/23/10
  • Number: 09485253
  • Owner: VISA INTERNATIONAL SERVICE ASSOCIATION
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of identity management in a multi-network system

Apparatus and methods of communication include receiving, at a device, a device-specific identifier and a credential associated with an issuing identity provider, wherein an identity of the device is capable of authentication by the identity provider based on the device-specific identifier and the credential. Further, the aspects include storing the device-specific identifier and the credential in a secure environment on the device. Additionally, the device-specific identifier is capable of being associated with different subscriber service accounts each with a different one of a plurality of service providers. The described aspects also include apparatus and methods of an identity provider and a provisioning provider for managing identities in a multiple network environment, and apparatus and methods of a service provider for providing the device with access to a service.

  • Pub Date: 2015/23/10
  • Number: 09661666
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods that effectuate transmission of workflow between computing platforms

A first command may be received from a client computing platform. The first command may include a proxy image. The proxy image may represent an image stored on the client computing platform. An identifier may be associated with the proxy image. The identifier may be transmitted to the client computing platform. The identifier may be associated with the image stored on the client computing platform. Edits to the image based upon the proxy image may be determined at a remote computing platform. Instructions may be transmitted from the remote computing platform to the client computing platform. The instructions may include the identifier. The instructions may be configured to cause the client computing platform to process the edits on the image.

  • Pub Date: 2015/22/10
  • Number: 09639560
  • Owner: GoPro, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Secure and anonymized authentication

An embodiment may involve receiving, by a computing system, a message from a wireless service provider system. The computing system may include one or more computing devices located, e.g., in the trusted cloud. The message may contain a service-provider-based identity of a client device, an indication that the service-provider-based identity has been authenticated by the wireless service provider, and a code that the client device obtained from a remote machine proximate to the client device. The computing system may generate an anonymized identity of the client device based on the service-provider-based identity. The computing system may verify that a task associated with the code is within the authorized capabilities of the anonymized identity. Possibly based on the code (and perhaps other information as well), the computing system may transmit an instruction to the remote machine. The instruction may direct the remote machine to perform the task.

  • Pub Date: 2015/22/10
  • Number: 09603019
  • Owner: Confia Systems, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Delivering offers

A method and system for delivering offers is provided. The method includes enabling for a user via a device, a Web browser and an associated URL. A processor determines a manufacturer and model of the device and that the device is associated with a shared device list. A user agent receives the manufacturer and model of the device and the processor transmits the user agent, the manufacturer and model of the device, and the associated URL. The manufacturer and model of the hardware device is extracted from the user agent and a rules engine is evaluated with respect to the manufacturer and model of the device. Specified content associated with the device is determined based on results of the evaluation. The specified content is transmitted to the Web browser.

  • Pub Date: 2015/22/10
  • Number: 09471930
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data center management using device identification over power-line

In one embodiment, a first device (e.g., a host device or power distribution unit) stores identification information of the first device, and determines, over a power connection, when the first device is in powered connectivity with a second device (e.g., a power distribution unit or host device, respectively). The first device may then communicate, with the second device over the power connection, identification information of at least one of either the first or second device, where the communicated identification information is accessible to a third device (e.g., a server) via a data network due to the communicating over the power connection. In another embodiment, a server may determine, based on the identification information, a physical location of a power distribution unit, and may deduce, based on the physical location of the power distribution unit, that a host device is physically located at the physical location of the power distribution unit.

  • Pub Date: 2015/22/10
  • Number: 09647723
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Communicating through physical vibration

A data transmitter includes a vibration motor and a switch to regulate voltage from a direct-current (DC) power supply to the vibration motor. A microcontroller generates a pulse width modulation signal with which to drive the switch and regulate the voltage to the vibration motor in a sinusoidal manner, to generate data as symbols from vibrations that form a series of bits from the vibration motor. The microcontroller may also cancel and jam a sound of vibration (SoV) created by the vibration motor. A data receiver includes a vibration sensor to sample data from vibrations in an incoming signal at a predetermined sampling rate, and a microcontroller, coupled to the vibration sensor, to control the sampling rate through an inter-integrated circuit (I2C) protocol or the like. A memory card, coupled to the microcontroller, stores the data with a serial peripheral interface (SPI) protocol or the like.

  • Pub Date: 2015/22/10
  • Number: 09608848
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Generating terahertz frequency combs from quantum cascade lasers using nonlinear frequency mixing

Methods and systems include generating one or more mid-infrared frequencies based at least upon electron transitions in one or more quantum cascade heterostructures. The quantum cascade heterostructures are concurrently configured with a significant second-order nonlinear susceptibility, a significant third-order nonlinear susceptibility, and an insignificant group velocity dispersion. A set of mid-infrared frequencies (that may include a frequency comb) is generated in the quantum cascade heterostructures based at least upon a four-wave mixing of the one or more mid-infrared frequencies. The four-wave mixing arises at least from the significant third-order nonlinear susceptibility and the insignificant group velocity dispersion. A set of terahertz frequencies (that may include a frequency comb) is generated in the quantum cascade heterostructures based at least upon a difference frequency generation from mid-infrared frequency pairs selected from the set of mid-infrared frequencies. The difference frequency generation arises at least from the significant second-order nonlinear susceptibility.

  • Pub Date: 2015/21/10
  • Number: 09509123
  • Owner: Board of Regents The University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for determining a handoff profile between telecommunications networks

Techniques are disclosed for evaluating an ongoing VoIP over WiFi call for purposes of determining when to hand it off to a circuit-switched cellular network connection. 802.11 WiFi call quality values X(i) over a sampled time period (N) of (j) samples for an ongoing telephone call over an 802.11 WiFi communication link are obtained and stored. An instantaneous annoyance value a(j) for each of the stored call quality values X(j) within sampled time period (N) is calculated. A current accumulated annoyance value A(i) by summing the instantaneous annoyance values a(j) is also calculated. The accumulated annoyance value A(i) is compared to a handoff threshold value H(i). A handoff of the telephone call from the 802.11 WiFi communication link to a circuit-switched cellular communication link is initiated when the accumulated annoyance value A(i) is greater than the handoff threshold value H(i).

  • Pub Date: 2015/20/10
  • Number: 09319959
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Push-based cache invalidation notification

In one embodiments, one or more first computing devices receive updated values for user data associated with a plurality of users; and for each of the user data for which an updated value has been received, determine one or more second systems that each have subscribed to be notified when the value of the user datum is updated and each have a pre-established relationship with the user associated with the user datum; and push notifications to the second systems indicating that the value of the user datum has been updated without providing the updated value for the user datum to the second systems.

  • Pub Date: 2015/20/10
  • Number: 09411732
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive content generation

Generation of interactive content. In an embodiment, a representation of candidate object(s) in content of a digital media asset are received. For each of the candidate object(s), feature(s) of the candidate object are compared to corresponding feature(s) of a plurality of reference objects to identify reference object(s) that match the candidate object. For each of the matched candidate object(s), a hotspot package is generated. The hotspot package may comprise a visual overlay which comprises information associated with the reference object(s) matched to the respective candidate object.

  • Pub Date: 2015/20/10
  • Number: 09336459
  • Owner: OIM SQUARED INC.
  • Location: Skaneateles, US
  • Details: Visit USPTO

Visit USPTO Page


Event log versioning, synchronization, and consolidation

Systems and methods can support log synchronization associated with a complex event handler. An event log can support storing prior event indicators. A new event indicator may be received. Temporal indicators associated with the new event indicator may be analyzed to establish consistent relative ordering with respect to prior event indicators. A synchronized timestamp may be generated in response to analyzing the temporal indicators. The new event indicator may be translated into a canonical form. The translated event indicator may be stored into the event log according to the synchronized timestamp. A rule associated with the complex event handler may be evaluated to identify a stored event dependency within a rule condition of the rule. The event log may be searched to match the translated event indicator against the stored event dependency. The rule may be triggered, and its action executed, in response to satisfying the rule condition.

  • Pub Date: 2015/20/10
  • Number: 09633088
  • Owner: Voalte, Inc.
  • Location: Sarasota, US
  • Details: Visit USPTO

Visit USPTO Page


Device searching method and electronic device supporting the same

An electronic device is provided. The electronic device includes a first communication module configured to support a first communication method, a second communication module configured to support a second communication method, a memory configured to store data used for operations of the first communication module and the second communication module, and a processor electrically connected to the first communication module, the second communication module, and the memory.

  • Pub Date: 2015/20/10
  • Number: 09571974
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Data storage system for analysis of data across heterogeneous information management systems

Systems and methods for generating customized reports from data storage databases and other information management system databases. The methods include normalizing queried information from different types of information management system databases to enable system-wide report generation. Other implementations are disclosed.

  • Pub Date: 2015/20/10
  • Number: 09633025
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Concurrently uploading multimedia objects and associating metadata with the multimedia objects

In one embodiment, a first computing device receives a first user input selecting a set of multimedia objects stored on the first computing device, and initiates upload of the set of multimedia objects to a second computing device. While the upload is in progress, a second user input is concurrently received selecting a subset of the set of multimedia objects, and a third user input is concurrently received comprising metadata, and the metadata is associated with one or more multimedia objects from the subset of multimedia objects.

  • Pub Date: 2015/20/10
  • Number: 09661076
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Carboxymethylcellulose polyethylene glycol compositions for medical uses

Uses of compositions comprising carboxypolysaccharides (CPS) including carboxymethyl cellulose (CMC) and polyethylene glycols (PEGs) are provided where the PEG is a PEG-epoxide covalently linked to the CPS in the presence of NHOH. In certain embodiments, the PEG attaches to only one CPS, forming a decorated CPS. In other embodiments, bi-functional PEG molecules are attached to adjacent CPSs, thereby forming a covalently cross-linked composition. Such compositions can be used as space-filling materials, load-bearing materials, anti-adhesion compositions, drug delivery vehicles, and lubricants of tissues and medical instruments.

  • Pub Date: 2015/20/10
  • Number: 09381271
  • Owner: FZIOMED, INC
  • Location: San Luis Obispo, US
  • Details: Visit USPTO

Visit USPTO Page


Method for providing application service

A method for providing application service is provided. The method discloses that a user is authenticated according to a received application service acquisition request from a user mobile phone, and when the user authentication is passed, the application service acquisition request is sent to an application server, so that the application server provides an application service to the user mobile phone according to the application service acquisition request. The application server does not need to authenticate the user mobile phone by performing an authentication operation on the user mobile phone through a wireless application protocol gateway, thus being capable of reducing the workload of the application server.

  • Pub Date: 2015/19/10
  • Number: 09544769
  • Details: Visit USPTO

Visit USPTO Page


Load balancing in a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing service may maintain a database of information or preferences associated with the conference requester and attempt to select a conference bridge based on the requester's information. Further, the conferencing routing service may receive performance information from a plurality of conference bridges that are able to conduct the collaboration conference and select a conference bridge in response to the performance information.

  • Pub Date: 2015/19/10
  • Number: 09374400
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Interface gateway and method of interfacing a property management system with a guest service device

An interface gateway interfaces between a first device and a second device serving a hospitality establishment. The first device is one of a property management system (PMS) and a guest service device, and the second device is the other of the property management system (PMS) and the guest service device. One or more communication ports perform data communications with the first device and the second device. One or more processors receive a message from the first device, determine that the message is in a first format, convert the message from the first format to an internal data structure, parse the message in the internal data structure to determine that the message is applicable to the second device, determine that the second device supports a second format, convert the message from the internal data structure to the second format, and send the message in the second format to the second device.

  • Pub Date: 2015/19/10
  • Number: 09456047
  • Owner: Guest Tek Interactive Entertainment Ltd.
  • Location: Calgary, CA
  • Details: Visit USPTO

Visit USPTO Page


Central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants.

  • Pub Date: 2015/19/10
  • Number: 09516076
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-depression compounds

This technology relates generally to compounds and methods for stimulating neurogenesis (e.g., post-natal neurogenesis, including post-natal hippocampal and hypothalamic neurogenesis) and/or protecting neuronal cell from cell death. Various compounds are disclosed herein. In vivo activity tests suggest that these compounds may have therapeutic benefits in neuropsychiatric and/or neurodegenerative diseases such as schizophrenia, major depression, bipolar disorder, normal aging, epilepsy, traumatic brain injury, post-traumatic stress disorder, Parkinson's disease, Alzheimer's disease, Down syndrome, spinocerebellar ataxia, amyotrophic lateral sclerosis, Huntington's disease, stroke, radiation therapy, chronic stress, abuse of a neuro-active drug, retinal degeneration, spinal cord injury, peripheral nerve injury, physiological weight loss associated with various conditions, as well as cognitive decline associated with normal aging, chemotherapy, and the like.

  • Pub Date: 2015/19/10
  • Number: 09616048
  • Owner: Board of Regents of The University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine migration tool

Tools and techniques for migrating applications to compute clouds are described herein. A tool may be used to migrate any arbitrary application to a specific implementation of a compute cloud. The tool may use a library of migration rules, apply the rules to a selected application, and in the process generate migration output. The migration output may be advisory information, revised code, patches, or the like. There may be different sets of rules for different cloud compute platforms, allowing the application to be migrated to different clouds. The rules may describe a wide range of application features and corresponding corrective actions for migrating the application. Rules may specify semantic behavior of the application, code or calls, storage, database instances, interactions with databases, operating systems hosting the application, and others.

  • Pub Date: 2015/16/10
  • Number: 09569259
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


User authentication in separate authentication channels

Apparatuses, systems, methods, and computer program products are disclosed for user authentication in separate authentication channels. A token module is configured to create a unique token in response to receiving user credentials from an unknown user for a secure interface of a third party system. An identity module is configured to log into the secure interface using the received user credentials, and submit the unique token to a private input element located behind the secure interface. A match module is configured to receive the unique token from the private input element and a user identifier associated with the unknown user from the third party system. The match module is configured to associate the received user credentials with the user identifier based on the unique token. An access module is configured to display information associated with the user identifier to the unknown user.

  • Pub Date: 2015/16/10
  • Number: 09363256
  • Owner: MX TECHNOLOGIES, INC.
  • Location: Lehi, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for fully configurable real time processing

Provided are systems, methods, and architectures for a neutral input/output (NIO) platform that includes a core that supports one or more services. The core may be thought of as an application engine that runs task specific applications called services. The services are constructed using defined templates that are recognized by the core, although the templates can be customized. The core is designed to manage and support the services, and the services in turn manage blocks that provide processing functionality to their respective service. Due to the structure and flexibility provided by the NIO platform's core, services, and blocks, the platform can be configured to asynchronously process any input signals from one or more sources and produce output signals in real time.

  • Pub Date: 2015/16/10
  • Number: 09454385
  • Owner: SOCIETAL INNOVATIONS IPCO LIMITED
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Multi-touch object inertia simulation

The inertia system provides a common platform and application-programming interface (API) for applications to extend the input received from various multi-touch hardware devices to simulate real-world behavior of application objects. To move naturally, application objects should exhibit physical characteristics such as elasticity and deceleration. When a user lifts all contacts from an object, the inertia system provides additional manipulation events to the application so that the application can handle the events as if the user was still moving the object with touch. The inertia system generates the events based on a simulation of the behavior of the objects. If the user moves an object into another object, the inertia system simulates the boundary characteristics of the objects. Thus, the inertia system provides more realistic movement for application objects manipulated using multi-touch hardware and the API provides a consistent feel to manipulations across applications.

  • Pub Date: 2015/16/10
  • Number: 09582140
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redwood, US
  • Details: Visit USPTO

Visit USPTO Page


Sigma-delta ADC with integrated raw image scaling filter

A system and method of processing raw image pixel information includes an integrated decimation filter and raw image scaling filter for a set of M columns of raw image pixel information. The decimation filter operates in the time domain; for example, to calculate a weighted average of time samples. The raw image scaling filter operates in the spatial domain; for example, to calculate a weighted average of spatial samples. The raw image pixel information is modulated by a sigma-delta analog-to-digital modulator. The system and method scale the raw image pixel information by a factor of 1/N. M and N are positive integers.

  • Pub Date: 2015/15/10
  • Number: 09342865
  • Owner: SONY CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for automated network scanning in dynamic virtualized environments

Systems and methods for managing jobs to be scanned based on existence of processing nodes are described. One of the methods includes obtaining identification information regarding operation of a first set of the processing nodes from an inventory and creating a job for scanning the processing nodes of the first set for security vulnerability. The job includes the identification information. The method further includes verifying the inventory to determine the first identifying information of the first set of processing nodes for removal from the job and loading the job having second identifying information for a second set of processing nodes that remain after the verifying operation.

  • Pub Date: 2015/15/10
  • Number: 09479527
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical display with integrated recent period zoom and historical period context data

A system and method are provided for displaying a data series. In one embodiment, a graphical interface is provided including at least one axis that is divided into a plurality of axis regions. Preferably, each axis region uses a different linear scale, and the plurality of axis regions forms a continuous non-linear scale. The graphical interface also displays the data series in relation to the plurality of axis regions, and the data series is plotted in relation to each axis region based on a scale resolution corresponding to each respective axis region.

  • Pub Date: 2015/15/10
  • Number: 09542709
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Configurable shipping container

Shipping containers for porous masses may include a bottom lid having a rectangular lid bottom and four bottom rims that are each continuous with the lid bottom; a tray comprising a tray bottom and four tray sidewalls that are each continuous with the tray bottom defining an interior with an open top; and a top lid having a rectangular lid top and four top rims that are each continuous with the lid top, wherein the tray is configured to be placed on a bottom lid with the bottom rims surrounding a portion of the tray with a top lid placed over the top of the tray with the top rims surrounding a portion of the tray.

  • Pub Date: 2015/15/10
  • Number: 09359104
  • Owner: Celanese Acetate LLC
  • Location: Irving, US
  • Details: Visit USPTO

Visit USPTO Page


Bidirectional data portability

A data processing method capable of providing improved bidirectional data portability includes receiving, at a first device, a request from a client computer to export data records related to the client computer, wherein the data records have been created under control of a first instance of an application program, where at least a portion of the data records have a first creation timestamp, identifying the data records, generating a package for export of the data records by formatting the data records into an intermediate format, by a second device, opening the package and providing the data to a second instance of an application program on the second device, where a portion of the data records have a second creation timestamp that is later than the first creation timestamp, creating the data records, and setting, for each data record of the portion, the second creation timestamp to the first creation timestamp.

  • Pub Date: 2015/15/10
  • Number: 09495421
  • Owner: ATLASSIAN PTY LTD
  • Location: Sydney, AU
  • Details: Visit USPTO

Visit USPTO Page


Automatically and dynamically reclaiming resources during virtual machine decommission

Embodiments of the present invention provide a method, computer program product, and computer system for reclaiming resources during virtual machine decommission. The method includes determining a virtual machine (VM) resource utilization and a cluster utilization. If the VM resource utilization is less than a first predetermined threshold and the cluster utilization is greater than a second predetermined threshold, the method then determines whether an active timer exists. If the active timer exists and has expired, then dynamic decommission of the VM is triggered.

  • Pub Date: 2015/15/10
  • Number: 09658894
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive integration flow using automated service discovery

For systems integration, an information published about an application programming interface (API) of a service is parsed to extract a pattern from the information. the pattern is compared with a stored pattern in a repository, wherein the stored pattern corresponds to a known API. When the pattern matches the stored pattern within a threshold degree of match, a conclusion is made that the API of the service is the known API. A collector code module is selected where the collector code module is configured to call the known API. The collector code module is sequenced in an integration sequence, to call the known API. A forwarder code module is also sequence din the integration sequence to forward a data output of the service to a consumer application.

  • Pub Date: 2015/15/10
  • Number: 09563490
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual drive mapping

The automatic mapping of a set of physical drives to virtual drives is disclosed. Given a maximum set of n physical servers, S-S, and a maximum set of m physical drives, D-D, a mapping of a set of virtual drives, V-V, to the physical drives D-D, is created, assuming n and m are fixed and known, and one virtual drive is created per server. Physical drives of size Dsize are organized into a maximum of p “Stripe Sets” SS-SS, each Stripe Set containing an equal number of physical drives. Each virtual drive will have a size, Vsize=(m*Dsize)/n (rounded down to the nearest integer). Virtual drives are mapped sequentially to Stripe Sets, starting with Vmapped to SS. Successive virtual drives are mapped to Stripe Sets until all virtual drives have been mapped to a Stripe Set.

  • Pub Date: 2015/14/10
  • Number: 09395932
  • Owner: Avago Technologies General IP (Singapore) Pte. Ltd.
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


System and method for resource access with identity impersonation

A gateway device comprising a processor and a memory, the processor is configured to receive a resource request message from an endpoint associated with a user, the resource request message including an external token, a resource operation, and a resource identifier. The processor is also configured to retrieve, from the memory, an authentication identifier associated with one of the endpoint and the user based on the external token and authorize the resource operation with a directory service using the authentication identifier. The processor is further configured to receive an authorization token from the directory service and initiate the resource operation with an internal resource using the authorization token.

  • Pub Date: 2015/14/10
  • Number: 09509684
  • Owner: FullArmor Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for pass-through authentication

A gateway device comprising a processor and a memory, the processor is configured to receive a login operation request from an external endpoint, the login operation request including a user identifier and user login credentials of a user. The processor is also configured to construct an authentication request including the user identifier and the user login credentials and transmit the authentication request to an internal directory service. The processor is further configured to receive an authentication response from the internal directory service, the authentication response including an authentication identifier for the user, and store the authentication identifier in the memory, the authentication identifier for use by the processor in pass-through impersonation of the user.

  • Pub Date: 2015/14/10
  • Number: 09450944
  • Owner: FullArmor Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting the future state of a mobile device user

In one embodiment, a method includes receiving first data indicating a current usage of a mobile device by a user. The method includes accessing second data associated with past user states of the user, where each user state corresponds to a temporal, spatial, or modal accessibility of the user. A future user state of the user is determined based on a weighted set of predictor functions, each predictor function comprising a machine-learned algorithm for a particular user state. The probability of each user state is based on past user states of the second data, wherein each past user state is weighted by a decay factor based on the corresponding time. One of the user states is selected as the future user state, and the operation of the mobile device is adapted at a future time to account for that future user state.

  • Pub Date: 2015/14/10
  • Number: 09461902
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Non-toxic primer mix

A non-toxic primer mix in which DBX-1 (copper(I) 5-nitrotetrazole) acts as the primary explosive portion of the primer. Furthermore, in this mix, boron carbide (BC) replaces the traditional frictionator/fuel, toxic antimony trisulfide. In addition, potassium nitrate replaces the toxic barium nitrate (BaNO)) as the oxidizer, providing an ignition flame from the primer in a pyrotechnic reaction. The non-toxic primer therefore embodies a lead-free, barium-free, antimony-free explosive material that can include added fuels, sensitizers, explosives and/or binders.

  • Pub Date: 2015/14/10
  • Number: 09409830
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods to process direction data of an audio input device using azimuth values

Devices, systems, and methods provide direction finding of an acoustic signal source with respect to a voice-controlled device. The direction can be found without using elevation data, instead determining the horizontal location based on power values of the received signal. A large number of candidate vectors having values for azimuth, elevation, and power may be generated by a steered response power algorithm. The large number of vectors is reduced to a small number of reference azimuths spanning an azimuth range by associating the vectors with the closest reference azimuth and then calculating an average and/or maximum power of the associated vectors at each reference azimuth. The reference azimuth with the highest average (or maximum) power may be set as the direction of the signal source. Alternatively, each reference azimuth having an average (or maximum) power exceeding a threshold may be considered a direction of one of multiple sources.

  • Pub Date: 2015/14/10
  • Number: 09621984
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Condition responsive indication assembly and method

A communications assembly includes a central processing unit and a plurality of hardhat assemblies. The central processing unit transmits central signals and receives remote communications from the hardhat assemblies. The hardhat assemblies are operatively connected to the central processing unit in order to transmit the remote communications and receive the central communications. A communications hub is operatively connected between the central processing unit and each of the hardhat assemblies to control independent communication between the central processing unit and the hardhat assemblies. The central processing unit includes an incident identification module for receiving the remote communications and for identifying a portion of the remote communications from a portion of the hardhat assemblies as indicating a situation requiring a communication to be sent to the portion of the hardhat assemblies. The portion may include one or more than one hardhat assembly.

  • Pub Date: 2015/14/10
  • Number: 09538801
  • Owner: GuardHat, Inc.
  • Location: Southfield, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable medium for dynamic device discovery for servers binding to multiple masters

A system that facilitate broadcast of a device discovery beacon by a dynamic physical device wishing to bind to one or more control systems are provided. If the dynamic physical device comprises a server that is configured to bind to multiple master controllers, the dynamic physical device may include a device Type Flag and set the value of the device Type Flag to indicate the dynamic physical device comprises a server. On detection of the beacon, a master controller evaluates the device Type Flag if it is present in the device discovery beacon. If the device Type Flag is present and indicates the dynamic physical device comprise a server which may bind to multiple master controllers, the master controller may automatically load a device Module for the dynamic physical device and commence communications with the dynamic physical device with no manual intervention.

  • Pub Date: 2015/13/10
  • Number: 09432262
  • Owner: AMX, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Scene documentation

A plurality of images are captured by an image capturing device that is an integral part of the mobile data collection platform from at least two different perspectives that depict a point of interest in a scene. Coincident with capture of each of the plurality of images, orientation information is obtained via orientation sensors of the mobile data collection platform, a position fix of an antenna associated with the mobile data collection platform is determined, and a position of an entrance pupil of the image capturing device is calculated. Scale information associated with at least one of the images is captured. Scene data comprises the images, the orientation information and the entrance pupil positions. A three dimensional position of the point of interest at the scene is determined based on photogrammetric image processing of the scene data.

  • Pub Date: 2015/13/10
  • Number: 09639941
  • Owner: Trimble Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Pushing secure notifications to mobile computing devices

Techniques are provided for pushing secure notifications to a mobile computing device. For example, a method for pushing secure notifications includes a push service platform receiving a push notification message request from an entity registered with the push service platform, processing the push notification message request to generate a secure push notification message, and sending the secure push notification message to a target mobile computing device through a native third-party push service associated with the target mobile computing device. The secure push notification message includes a message ID (identifier) that corresponds to message content associated with the push notification message request. The method further includes the push service platform receiving a pull message request from the target mobile computing device, the pull message request requesting the message content associated with the push notification message corresponding to the message ID, and sending the requested message content associated with the push notification message to the mobile computing device.

  • Pub Date: 2015/13/10
  • Number: 09615259
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Operations maturity model

Embodiments are directed towards an operations maturity model. An operations management system may associate events with one or more organizations. Event metric information may be provided based on the events for one or more sub-scores. The sub-scores may be scaled to fit within a defined range. An operations maturity score may be provided for the organizations that may be based on the scaled sub-scores. One or more recommendations may be provided to increase the operations maturity score for the organizations based on operations maturity scores that correspond to the one or more organizations. Providing the recommendations, includes providing a correlation of operations practices and the sub-scores and providing configuration recommendations based on the operations practices that are correlated with above average sub-scores.

  • Pub Date: 2015/13/10
  • Number: 09367810
  • Owner: PagerDuty, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Low cost mesh network capability

A wireless device that utilizes a single network interface to simultaneously connect to an infrastructure network and a mesh network. The device has a driver layer with a media access control module for each network type. A multiplexing module and transceiver module within the driver can direct received information associated with one of the networks to an appropriate media access control and then to an appropriate network adapter. For transmitted data, the multiplexing module can receive data from the application layer through an appropriate network adapter and route it to an appropriate media access control module for processing. The processed data can be interleaved by the transceiver for transmission.

  • Pub Date: 2015/13/10
  • Number: 09503957
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Load condition based transfer of processing responsibility

According to one embodiment, a method comprises an operation of determining whether an ingress control message is locally terminated control traffic on a digital device prior to the ingress control message being forwarded to a hardware processor of the digital device for processing. A priority is assigned to the ingress control message based on information within the ingress control message, if the ingress control message is determined to be locally terminated control logic.

  • Pub Date: 2015/13/10
  • Number: 09450880
  • Owner: Aruba Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic virtual storage creation and provisioning of virtual machine resources

A method and apparatus are disclosed of identifying a virtual machine usage of enterprise network resources, such as memory storage usage. One example method of operation may include transmitting a storage request to a database to determine an amount of physical memory storage available in the enterprise network. The method may also include receiving an alert message indicating a virtual machine currently operating has exceeded a predetermined memory storage threshold value. The method may also include creating a new virtual hard disk (VHD) to accommodate the exceeded predetermined memory storage threshold value.

  • Pub Date: 2015/13/10
  • Number: 09436496
  • Owner: Open Invention Network LLC
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions comprising free-standing two-dimensional nanocrystals

The present invention is directed to compositions comprising free standing and stacked assemblies of two dimensional crystalline solids, and methods of making the same.

  • Pub Date: 2015/13/10
  • Number: 09416011
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Blind decoding for an enhanced physical downlink control channel (EPDCCH)

Technology for a user equipment (UE) configured for blind decoding downlink control information (DCI) from an enhanced physical downlink control channel (EPDCCH). The UE can receive, from a base station, the EPDCCH that includes the DCI. The UE can attempt one or more times to decode the DCI from enhanced control channel elements (ECCE) of the EPDCCH from physical resource block (PRB) region candidates in a PRB set using a selected set of enhanced resource element group (EREG) index maps for the ECCE until the DCI is successfully decoded. The resource elements (REs) of a PRB pair can include a block of symbols mapped in sequence to resource elements on an associated port when the REs are part of the EREGs assigned for the EPDCCH transmission.

  • Pub Date: 2015/13/10
  • Number: 09549404
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing and executing sensitive logic semantics

Removing high level logic structure from a source program. Two or more source program fields are characterized by their respective value characteristics. A first field is mapped, with respect to the source program, to a second field having similar value characteristics as the first field. A target program is then created by replacing, in the source program, the first field with the second field and replacing each first field value with a corresponding second field value thereby preserving the value characteristics of the source program.

  • Pub Date: 2015/12/10
  • Number: 09639675
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time distributed tree

Some embodiments provide a real-time distributed tree (RDT) comprising scalability, protocol, and data layers for dynamically and in real-time defining and implementing customer applications over cloud operator resources. The RDT is a tree structure with customer branches comprising nodes hierarchically organizing domains, domain applications, and application rooms. Service layer service nodes can be linked to any customer branch node. Linking service nodes to the customer node reserves services represented by the service nodes for allocation to or scaling of any customer application or room under that customer branch. Linking service nodes to an application node or room node allocates the corresponding services to the application or room. The RDT moves linkages to maximize service usage and minimize wasted allocation. Protocol layer nodes modify signaling or messaging of the services implementing a customer application. Data layer nodes provide customizable four-dimensional storage of activity occurring anywhere in the customer branch.

  • Pub Date: 2015/12/10
  • Number: 09584440
  • Owner: XIRSYS LLC
  • Location: Valencia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and computer program products for generating a model of network application health

Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that corresponds to activities of multiple applications that are operable to execute on at least one networked device, and combining the received activity data to remove redundant portions thereof and/or to reconcile inconsistencies therein. Based on the received activity data, ones of the multiple applications are identified, and relationships between the identified applications are determined. A model is generated including the identified applications and the relationships therebetween, and a representation of the model is displayed. Related computer program products are also provided.

  • Pub Date: 2015/12/10
  • Number: 09634915
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Management system for using speech analytics to enhance contact center agent conformance

A call center compliance system is used to ensure that agents adhere to call center policies and applicable regulations when handling calls. A call handler processing a call between an agent and a remote party bridges on a speech analytics component. A keyword set is used by the speech analytics component to analyze the remote party's or the agent's speech. If a keyword is detected, an event notification is provided from the speech analytics component to the call handler. A logic script executing in the call handler defines what actions are to occur in response to receiving the event notification. The call handler can provide information to the agent, record a violation, or await further event notifications. In one embodiment, detection of a first keyword in a first keyword set spoken by a remote party causes the agent's speech to be monitored using a second keyword set.

  • Pub Date: 2015/12/10
  • Number: 09473634
  • Owner: NOBLE SYSTEMS CORPORATION
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for efficient security coverage of mobile software applications using machine learning

For one embodiment, a method is described that involves the instrumenting of an application of a computing system with at least one monitoring function, where the monitoring function is capable of operating in a run-time environment during processing of the instrumented application. The movement of data associated with the application is tracked by one or more monitoring functions. This data is at least partially identified by a storage location. Thereafter, a determination is made whether movement of the data from a first storage location to a second storage location is suspicious, and if so, suspicious movement of the data is reported.

  • Pub Date: 2015/12/10
  • Number: 09594905
  • Owner: FireEye, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Computing system for managing data

Various embodiments are described for systems and methods for managing data. The system may include a device group configured for peer-to-peer communications, the device group including a computing device and one or more peer computing devices. The system includes a cross device application programming interface (API) that is implemented as a device group API client executed on the computing device and each of the peer computing devices. Each device group API client includes a permissions module that is configured to determine whether a request satisfies a device-group-specific permission for access to data stored on any device associated with the device group. Upon authorization of the request, a file storage module is configured to retrieve and output the requested file.

  • Pub Date: 2015/12/10
  • Number: 09479581
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive audio guidance navigation

In a method for providing adaptive audio guidance, determining, by one or more processors, a route of a computing device, wherein the route is from an initial location of the computing device to a destination. Determining, by one or more processors, an estimated time of arrival at which the computing device would arrive at the destination. Prompting, by one or more processors, a user to input a desired arrival time. Determining, by one or more processors, whether to provide audio guidance based on a determination of whether the estimated time of arrival is within a pre-determined time period before the desired arrival time.

  • Pub Date: 2015/12/10
  • Number: 09587955
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for transmitting and distributing media content

A technique for post-processing media content on a network by a GPU cloud computing system is provided. The system includes a plurality of computer systems providing a content submission connection for uploading the media content. The system includes a processor configured to receive descriptive information related to the media content via the network, receive the media content via the content submission connection which has a quicker uploading bandwidth than the network, process the media content; and distribute processed media content via the network that is separated from the content submission connection. The system further includes a distributed GPU cloud computing platform to perform parallel post-processing of the media content, and an immersive 3D interface.

  • Pub Date: 2015/11/10
  • Number: 09554174
  • Details: Visit USPTO

Visit USPTO Page


Sensing proximity utilizing a wireless radio subsystem

In one embodiment, a method includes, by an RF transceiver of a wireless communications device associated with a first user of an online system, transmitting an RF reference signal to each antenna of multiple antennas coupled to the transceiver. The method also includes, by a processor of the wireless communications device, determining, for each antenna of the multiple antennas, at least one characteristic of the RF reference signal reflected back from the antenna. The method further includes, by the processor of the wireless communications device, characterizing, based on the at least one determined characteristic, at least one aspect of an environment around the device to determine that an object is approaching the device. The method also includes, by the processor of the wireless communications device, retrieving from the online system, based on determining that the object is approaching the device, information associated with the first user.

  • Pub Date: 2015/09/10
  • Number: 09369891
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for anticipating demand for a computational resource by containers running above guest operating systems within a distributed, virtualized computer system

The current document is directed to methods and systems for efficiently executing OSL-virtualization containers within the execution environments provided by virtual machines that execute above traditional virtualization layers within large, virtualized, distributed computing systems. The currently disclosed methods and systems anticipate the need for additional virtual machines in order to meet anticipated demands for one or more computational resources by the containers. In addition, the methods and systems provision and launch virtual machines with computational-resource allocations that minimize overhead and computational-resource wastage. In one implementation, computational-resource utilization of ATMs and containers within the virtualized, distributed computer system are periodically monitored in order to estimate future demand for the computational resource and, when necessary, to launch additional virtual machines to meet the estimated future demand for the computational resource.

  • Pub Date: 2015/09/10
  • Number: 09619261
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


History preserving data pipeline

A history preserving data pipeline computer system and method. In one aspect, the history preserving data pipeline system provides immutable and versioned datasets. Because datasets are immutable and versioned, the system makes it possible to determine the data in a dataset at a point in time in the past, even if that data is no longer in the current version of the dataset.

  • Pub Date: 2015/09/10
  • Number: 09483506
  • Owner: Palantir Technologies, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhancing user data derived from digital communications

A computer-implemented method for enhancing and utilizing user data derived from digital interactions includes receiving a submission generated by input into a client side application interface by a first user on a first computing device, and determining, based on attributes of the submission, that the submission is in response to an issue-specific communication advertising information concerning a first issue, the issue-specific communication indicating a request for a financial transaction, and that that the financial transaction related to the issue-specific communication is requested. The method includes generating a first dataset associated with the first user, searching one or more additional datasets for additional data to be associated with data elements of the first dataset, associating the additional data from the one or more additional datasets with the first user, and generating a data model corresponding to the first user.

  • Pub Date: 2015/08/10
  • Number: 09348862
  • Owner: Cay Baxis Holdings, LLC
  • Location: New Haven, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple resource servers interacting with single OAuth server

A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access.

  • Pub Date: 2015/08/10
  • Number: 09450963
  • Owner: Oraclle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method to operate a control panel for a production system, as well as a control system for a production system

In a method for operating a control panel for a production system in particular for printing system, a control system is provided comprising a main computer. The main computer is connected via a data connection with one or more client computers on which a browser is executed. The control panel for the production system is displayed in the respective browser. Via an operation of a user at the control panel, an action request is triggered at a web user interface with which an action is requested at the main computer. Upon every action request, the web user interface checks according to predetermined rules whether this action is allowed, and blocks the action if it is not allowed.

  • Pub Date: 2015/08/10
  • Number: 09395943
  • Owner: Oce Printing Systems GmbH & Co. KG
  • Location: Poing, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for remote connection

A system and method for establishing a virtual network connection between an initiating computing device operated by an initiator and a target computing device operated by a target so that one of said computing devices is able to control the other of said computing devices. The system comprises a third party proxy to which the computing devices are connected. The third party proxy receives a request for a virtual network connection to said target computing device from said initiating computing device and requests initiator credentials for said initiating computing device and target credentials for said target computing device. Said credentials are delivered to the respective computing device. The system also comprises a core node configured to receive the credentials from the respective computing device, authenticate the received credentials, and if said credentials are authentic, establish the virtual network connection between said initiating computing device and said target computing device.

  • Pub Date: 2015/08/10
  • Number: 09450943
  • Owner: RealVNC Ltd
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Interactive system and process

A method of delivering an instruction () to a mobile user device () connected to a network () is disclosed. The method comprising the steps of receiving an interactive workflow (), translating the interactive workflow into the instruction () in a form executable by the mobile user device (), and sending a message () including the instruction () to the mobile user device ().

  • Pub Date: 2015/08/10
  • Number: 09635488
  • Details: Visit USPTO

Visit USPTO Page


Enabling mobile applications to acquire a MAC address for obtaining location information

Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.

  • Pub Date: 2015/08/10
  • Number: 09509786
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Drive device

A drive device for controlling an electric motor, including a processor, and a non-transitory storage medium containing program instructions, execution of which by the process causes the drive device to provide functions of a customization unit and a core unit. The customization unit receives, from an external device, a command value designating an operating state of the electric motor, converts the command value using a predetermined reference value, and outputs the converted command value. The core unit receives the converted command value from the customization unit, recovers a physical quantity from the received converted command value, and controls the electric motor in accordance with the recovered physical quantity.

  • Pub Date: 2015/08/10
  • Number: 09654047
  • Owner: FUJI ELECTRIC CO., LTD.
  • Location: Kawasaki-Shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for customizing indicator codes behavior

In accordance with embodiments of the present disclosure, an information handling system may include a processor and a management controller communicatively coupled to the processor for out-of-band management of the information handling system. The management controller may be configured to receive an event relating to an information handling resource of the information handling system and communicate a command to the information handling resource for applying a customized indicator code behavior to a visual indicator associated with the information handling resource.

  • Pub Date: 2015/07/10
  • Number: 09639408
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing contactless payment with a near field communications attachment

A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable of connecting the attachment to an audio jack on a mobile device. Further, a system and method in accordance with exemplary embodiments may include receiving a payment initiation instruction from a customer, using a near field communication antenna, sending payment information to a point of sale device, using one or more computer processors, encoding data related to the payment as audio data, and transmitting the data related to the payment through an audio jack.

  • Pub Date: 2015/07/10
  • Number: 09378496
  • Owner: CAPITAL ONE FINANCIAL CORPORATION
  • Location: McLean, US
  • Details: Visit USPTO

Visit USPTO Page


Role-driven notification system including support for collapsing combinations

Embodiments of the invention relate to a method of implementing role-driven notification. The method includes storing, by a cloud infrastructure system including computing devices, notification templates. Each of the notification templates are associated with a role. The method further includes determining that a user is associated with a first role and a second role, determining that the first role is associated with a first notification template and the second role is associated with a second notification template. Further, the method includes combining the first template and the second template to generate a third template, based on the third template, generating a notification. The method then, sends the notification to the user.

  • Pub Date: 2015/07/10
  • Number: 09646069
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for improving startup performance and interoperability of a virtual application

A data structure including simple and complex objects. Each simple object includes a content type indicator, a size indicator, and one or more simple data types. Each complex object includes a content type indicator, a size indicator, and one or more child objects. The complex objects include a layer object having first and second child objects. The first child object is a collection of complex objects storing information for configuring a virtual filesystem of a virtual application at application startup. The second child object is a collection of complex objects storing information for configuring a virtual registry of the virtual application at application startup. Reading of selected simple and complex objects may be deferred at startup based on the content type indicator. Deferred objects may be read after startup when access to information stored by the deferred object is request by the virtual application.

  • Pub Date: 2015/07/10
  • Number: 09569286
  • Owner: CODE SYSTEMS CORPORATION
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Exploiting software compiler outputs for release-independent remote code vulnerability analysis

A central check system (CCS) is coupled to a remote software system (RSS). Data is fetched from the RSS, the data being software code derivatives generated by a software compiler on the RSS with a version different than a version of the software program associated with the CCS. Static software testing is performed of the software program on the CCS using the fetched data and test results provided in a required format.

  • Pub Date: 2015/07/10
  • Number: 09569335
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and methods to configure a query language using an operator dictionary

Systems and methods to configure a query language using an operator dictionary are described. The system receives, from a first user, a search query to search for document information in a database. The system determines that terms of the search query from the first user are in accordance with dictionary information that corresponds to the first user. The dictionary information includes a first list of compatible query operators. The system applies the search query to the index data structure in the database to identify the document information. The system sends an electronic interface to the first user that includes the document information.

  • Pub Date: 2015/06/10
  • Number: 09460151
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for remotely servicing an industrial printer

A method and system for remote servicing of an industrial printer includes obtaining, on a processor, sensor data that indicates values output by a sensors configured to measure physical phenomena related to a plurality of components of the industrial printer. Also obtained, on the processor, is parameter data that indicates values for parameters that indicate user settings for operation of the industrial printer. It is determined, on the processor, a service issue related to the industrial printer based on the sensor data and the parameter data, It is also determined, at least in part on the processor, an action to be performed on the industrial printer in response to the service issue. Furthermore; the action is caused to be initiated. In some embodiments, the action is initiated at one facility different from a facility where the industrial printer is located.

  • Pub Date: 2015/06/10
  • Number: 09524132
  • Owner: Videojet Technologies, Inc.
  • Location: Wood Dale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for call and data matching in a contact center

A system and method for processing interaction requests includes a computer system that receives over a data channel from an end user device accessible to the customer, a request for an interaction. The request includes data from an application running on the end user device. The data is stored by the computer system upon receipt. When a voice call from a telephony device accessible to the customer is received, a voice media session is established with the telephony device over a voice channel. The data is identified based on information associated with the voice call. A contact center resource is further identified for routing the voice call. The data is attached to a request to route the call to the identified contact center resource.

  • Pub Date: 2015/06/10
  • Number: 09621727
  • Owner: GENESYS TELECOMMUNICATIONS LABORATORIES, INC.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Medication tracking

A system and method is described for printing a label with an RFID tag. The system includes an RFID reader that queries a first RFID tag coupled to a first medicinal container that includes a medication. In response, the system receives a first unique identifier and uses the first unique identifier to determine a status of the medication, associate the first medicinal container with a medical provider and print a second label that includes a second RFID tag for a second medicinal container.

  • Pub Date: 2015/06/10
  • Number: 09582644
  • Owner: Kit Check, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing system, information storage apparatus, and location information storing method

An information storage apparatus includes a transmission unit that transmits configuration information to an operation terminal connected to the information storage apparatus, the configuration information indicating whether the information storage apparatus is configured to store location information of the operation terminal; a control unit that performs a process requested by a request sent from the operation terminal; and a storage control unit that stores, in a storage unit of the information storage apparatus, the location information of the operation terminal in association with information related to the process requested by the request. When the configuration information indicates that the information storage apparatus is configured to store the location information, the control unit performs the process requested by the request only when the location information is received from the operation terminal together with the request.

  • Pub Date: 2015/06/10
  • Number: 09408218
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Comment ordering system

In one embodiment, a social networking system receives a request by a first user for user comments associated with a content object, accesses a data store of user comments to retrieve a set of user comments associated with the content object, orders the set of user comments based on a time value associated with each comment of the set of user comment, adjusts the order of user comments based on social graph information of the first user, and presents the adjusted list of user comments to the first user.

  • Pub Date: 2015/06/10
  • Number: 09639628
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Using an alias volume name for a volume to allocate space to a data set

Provided are a computer program product, system, and method for using an alias volume name for a volume to allocate space to a data set. An assignment of a plurality of volumes to a data set is maintained, wherein the volumes are configured in a storage system. A request is received to extend the data set. An alias volume name is assigned to the data set for a previously assigned volume to the data to extend the data set in response to one of the previously assigned volumes having available space to extend the data set. A base volume name is assigned to the data set for a volume not assigned to the data set in response to one of the previously assigned volumes to the data set not having available space to extend the data set.

  • Pub Date: 2015/05/10
  • Number: 09460003
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing contactless payment with a near field communications attachment

A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable of connecting the attachment to an audio jack on a mobile device. Further, a system and method in accordance with exemplary embodiments may include receiving a payment initiation instruction from a customer, using a near field communication antenna, sending payment information to a point of sale device, using one or more computer processors, encoding data related to the payment as audio data, and transmitting the data related to the payment through an audio jack.

  • Pub Date: 2015/05/10
  • Number: 09378495
  • Owner: CAPITAL ONE FINANCIAL CORPORATION
  • Location: McLean, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing a supply of breast milk

A system is disclosed for managing a supply of breast milk. In one form the system includes a codified container for receiving expressed breast milk. A computing device receives an image of the expressed milk in the codified container. The codification allows for software to recognize the size and type of the container, as well as scale and orientation, to translate the image into an accurate volume. The milk data is then processed and analyzed to produce feedback regarding the pumping session, such as logs, charts, or reminders. In other embodiments, nipple positioning may be analyzed as well.

  • Pub Date: 2015/05/10
  • Number: 09370612
  • Owner: MEDELA HOLDING AG
  • Location: Baar, CH
  • Details: Visit USPTO

Visit USPTO Page


Malware analysis methods and systems

Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be network booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device.

  • Pub Date: 2015/05/10
  • Number: 09516060
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Low-temperature nanosolders

A nanosolder comprises a first metal nanoparticle core coated with a second metal shell, wherein the first metal has a higher surface energy and smaller atomic size than the second metal. For example, a bimetallic nanosolder can comprise a protective Ag shell “glued” around a reactive Cu nanoparticle. As an example, a 3-D epitaxial Cu-core and Ag-shell structure was generated from a mixture of copper and silver nanoparticles in toluene at temperatures as low as 150° C.

  • Pub Date: 2015/05/10
  • Number: 09463532
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Golf club head

A golf club head comprises a body having a face, a crown and a sole together defining an interior cavity. The body having a channel located on the sole and extending generally from a heel end of the body to a toe end of the body. A weight member movably positioned within the channel such that a position of the weight member within the channel is able to be adjusted, thereby adjusting a location of a center of gravity of the body. Additionally, adjustment of the weight member provides a maximum x-axis adjustment range of the position of the center of gravity (Max ΔCGx) that is greater than 2 mm and a maximum z-axis adjustment range of the center of gravity (Max ΔCGz) that is less than 2 mm.

  • Pub Date: 2015/05/10
  • Number: 09561413
  • Owner: TAYLOR MADE GOLF COMPANY, INC.
  • Location: Carlsbad, US
  • Details: Visit USPTO

Visit USPTO Page


Domain-specific language for dataset transformations

Techniques related to a domain-specific language for dataset transformations are disclosed. A server computer may process a table definition composed in a domain-specific language. The table definition may include a sequence of one or more dataset transformations to be performed on one or more source tables to generate a target table. The sequence may include a customized transformation. A source dataset may be provided as input to an implementation of the customized transformation. An output dataset may be generated as a result of executing the implementation. An intermediate table may be generated based on performing at least one dataset transformation on a particular source table. A supplemental portion for the intermediate table may be generated based on performing the at least one dataset transformation on an appended portion of the particular source table. The target table may be generated based on combining the supplemental portion with the intermediate table.

  • Pub Date: 2015/05/10
  • Number: 09576015
  • Owner: Palantir Technologies, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner

Multiple applications request data from multiple storage units over a computer network. The data is divided into segments and each segment is distributed randomly on one of several storage units, independent of the storage units on which other segments of the media data are stored. At least one additional copy of each segment also is distributed randomly over the storage units, such that each segment is stored on at least two storage units. This random distribution of multiple copies of segments of data improves both scalability and reliability. When an application requests a selected segment of data, the request is processed by the storage unit with the shortest queue of requests. Random fluctuations in the load applied by multiple applications on multiple storage units are balanced nearly equally over all of the storage units. This combination of techniques results in a system which can transfer multiple, independent high-bandwidth streams of data in a scalable manner in both directions between multiple applications and multiple storage units.

  • Pub Date: 2015/05/10
  • Number: 09432460
  • Owner: Avid Technology, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Bayer-consistent raw scaling

A system and method for scaling an image includes receiving raw image data comprising input pixel values which correspond to pixels of an image sensor; and filtering pixels according to a Bayer-consistent ruleset by a first scaling factor in a first direction and a second scaling factor in a second direction perpendicular to the first direction, wherein the first scaling factor is different from the second scaling factor. The system and method may also include outputting scaled image data as output pixel values, which correspond to subgroups of the input pixel values. The Bayer-consistent ruleset includes a set of filter weights and a series of scaling rules. The Bayer-consistent ruleset results in a scaled image having a high degree of Bayer-consistency.

  • Pub Date: 2015/05/10
  • Number: 09514514
  • Owner: Sony Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Techniques for configuring a multimedia system

In one embodiment, a technique is provided to configure a home multimedia system. Software executing on a controller or other device access component profiles describing attributes of components, one or more zone configurations that indicate components that are present in one or more zones, and one or more connection configurations that indicates how components that are present in the one or more zones are interconnected. The software applies a set of predefined service rules to the data structures to generate workflows for possible services, wherein each service rule defines one or more components and one or more interactions required for providing a corresponding service, and each workflow indicates how one or more of the components that are present in the one or more zones interact to provide a service. Executable forms of the workflows are generated, and executed to provide services to a user.

  • Pub Date: 2015/02/10
  • Number: 09513615
  • Owner: Savant Systems, LLC
  • Location: Hyannis, US
  • Details: Visit USPTO

Visit USPTO Page


Secure proxy

Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy may be provided that includes a set of policies. The policies may be applicable to various network protocol layers (e.g., an application layer), network traffic types, and/or endpoint resolution. The set of policies may be used to inspect, restrict and/or modify traffic between the trusted and untrusted environment to ensure data and network security. A proxy device may use the set of policies, for example, to obtain current service-related information (such as the list of IP addresses) currently associated with a computing resource requested by an application. Such endpoint information may be used, in turn, to update a white list.

  • Pub Date: 2015/02/10
  • Number: 09660998
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Display device and controlling method thereof

A display device including a display module configured to display a content corresponding to a video on a main screen of the display device; an interface module configured to receive an enlargement input request from a remote controller; and a controller configured to enter an enlargement mode in accordance with the enlargement input request received from the remote controller, display a window including the content displayed on the main screen, display an indicator for selecting a specific area of the displayed content within the displayed window, enlarge the selected specific area of the displayed content, and display the enlarged selected specific area of the displayed content on the main screen.

  • Pub Date: 2015/02/10
  • Number: 09554084
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Modifying web content at a client

Producing a modified document object model structure is disclosed. A desired webpage is requested. An alternative webpage is received in response to the request instead of an original version of the desired webpage to be rendered. The alternative webpage is processed. Program code included in the alternative webpage is utilized to request the original version of the desired webpage. The original version of the desired webpage is received. The modified document object model structure different from an original document object model structure corresponding to the received original version of the desired webpage is produced.

  • Pub Date: 2015/01/10
  • Number: 09641591
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Execution plan generator and execution engine for interfacing with application programming interfaces

Embodiments for a method of interfacing with a remote application programming interface (API) by defining an execution plan using an interface definition language and a dependency configuration file to generate a constrained directed graph of hierarchically dependent functions of the API, and executing the execution plan using an executing engine that traverses the graph to call the API functions in a defined order and convert data output by a parent function call to input required by a child function call until a terminal vertex is reached that results in directing the resulting in an action such as data to persist and/or affecting the state of a system.

  • Pub Date: 2015/01/10
  • Number: 09424112
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automatically identifying and matching a color of a structure's external surface

The method and system may be used to provide an indication of a color value for a particular siding sample and to color match a specific siding product to the color value of the siding sample. The system receives a digital image of a siding sample and a desired color value to be matched. A color query module plots this desired color value as a desired color point in a multidimensional color space together with a plurality of color reference points. Each color reference point represents the color value of an existing siding product. The system determines a “distance” between the desired color point and each plotted color reference point within the color space and identifies the siding product associated with the color reference point that is located the shortest distance to the desired color point within the color space.

  • Pub Date: 2015/30/09
  • Number: 09384542
  • Owner: STATE FARM MUTUAL AUTOMONILE INSURANCE COMPANY
  • Location: Bloomington, US
  • Details: Visit USPTO

Visit USPTO Page


Suggesting candidate removable software dependencies

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes determining that a cycle exists in the aggregated dependency graph, determining which of the links in the cycle has a lowest weight, and adding a first link in the cycle having the lowest weight to a set of candidate removable links. The links in the set of candidate removable links are classified as candidate removable links, and a user interface presentation is provided that presents the aggregated dependency graph and which visually distinguishes removable links from other links in the aggregated dependency graph.

  • Pub Date: 2015/30/09
  • Number: 09411706
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Specifying a model architecture of software elements and generating an aggregated dependency graph therefrom

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes receiving a user-specified model architecture of software elements in a project, wherein the model architecture is a hierarchy graph having leaf nodes that represent user-selected portions of the project, and one or more non-leaf nodes, wherein each non-leaf node is a parent node of a user-specified group of leaf nodes, non-leaf nodes, or both. An aggregated dependency graph is generated from the user-specified model architecture. A presentation is generated of the aggregated dependency graph for the model architecture, wherein the presentation displays aggregated dependencies between the user-selected nodes of the model architecture.

  • Pub Date: 2015/30/09
  • Number: 09411557
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Query-based software dependency analysis

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes receiving a query that defines a dependency between the software elements in a project. Searching a database to identify matching source software elements having the one or more source attributes and target software elements having the one or more target attributes of the query. Identifying pairs of matching source software elements and matching target software elements having the specified relationship, and generating, for each pair of matching source software elements and matching target software elements having the specified relationship, a new dependency in a raw dependency graph, the new dependency being a dependency from a source software element of the pair to the target software element of the pair.

  • Pub Date: 2015/30/09
  • Number: 09323644
  • Details: Visit USPTO

Visit USPTO Page


Implicit software dependency analysis

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes receiving a request to generate implicit dependencies introduced by remote procedure calls in a project. A registration of a remote procedure call is identified, wherein the registration of the remote procedure call specifies a target function and a name for the remote procedure call. An invocation of the remote procedure call using the name for the remote procedure call is identified, wherein the invocation occurs in a source software element of the project. A definition of the target function of the remote procedure call is identified, wherein the target function is defined in a target software element of the project. A new dependency is generated, the new dependency being a dependency from the source software element to the target software element.

  • Pub Date: 2015/30/09
  • Number: 09411707
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical dependency analysis of source code

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes processing selected software elements as represented by a raw dependency graph and a hierarchy graph to generate data representing an aggregated dependency graph, the aggregated dependency graph having nodes representing the selected software elements and aggregated dependencies between one or more of the selected software elements, wherein each aggregated dependency between a pair of the selected software elements represents that a first software element of the pair, or a descendant of the first software element according to the hierarchy graph, depends, according to the raw dependency graph, on a second software element of the pair or a descendant of the second software element according to the hierarchy graph. The data representing the aggregated dependency graph is provided in response to the request.

  • Pub Date: 2015/30/09
  • Number: 09361077
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical dependency analysis enhancements using disjoint-or trees

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing hierarchical dependency analysis using disjoint-or trees. One of the methods includes receiving, from a user, a request to remove a node from a hierarchy, wherein the hierarchy is a directed graph having nodes and links, wherein each node in the hierarchy represents a software element in the project and each directed link in the hierarchy connects a corresponding pair of nodes and represents containment of a child software element represented by a first node of the pair by a parent software element represented by a second node of the pair. If a parent element of a disjoint-or tree corresponds to a parent node of the removed node, a union of dependencies for the removed node is determined. The union of dependencies is then subtracted from the parent element and from every ancestor element of the parent element.

  • Pub Date: 2015/30/09
  • Number: 09547478
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Dynamic remote packet capture

A device may be configured to receive information regarding one or more ports associated with a routing device; output, to the routing device, filter information associated with at least a particular port, of the one or more ports associated with the routing device, the filter information specifying one or more conditions associated with traffic of interest; receive, from the routing device, and based on the outputted filter information, information regarding traffic of interest received or sent by the routing device via the particular port, the traffic of interest being less than or equal to all traffic received or sent by the routing device via the particular port; and store or output a representation of at least a portion of the received information regarding the traffic of interest.

  • Pub Date: 2015/30/09
  • Number: 09350630
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Determining an indoor/outdoor classification for a call

A device may be configured to obtain metric information relating to an operating environment. The metric information may describe a signal strength or a signal quality associated with one or more calls placed in the operating environment. The device may be configured to obtain a threshold for the metric information. The device may be configured to determine indoor/outdoor classification information that identifies whether the one or more calls are classified as an indoor call or an outdoor call or an unclassified call based on whether the metric information satisfies the threshold. The device may be configured to determine geolocation information identifying one or more geographical locations associated with the one or more calls. The device may be configured to provide the indoor/outdoor classification information and the geolocation information.

  • Pub Date: 2015/30/09
  • Number: 09584966
  • Owner: Viavi Solutions UK Limited
  • Location: Berkshire, GB
  • Details: Visit USPTO

Visit USPTO Page


Cloud storage methods and systems

A system receives first requests to create electronic storage objects that are accessible on the communication network or another communication network, and creates electronic storage objects responsive to the first requests. The first requests specify one or more data types to which the system should convert raw data received for storage in the electronic storage objects. The system also receives second requests to store specified data to the electronic storage objects, and stores received raw data (or converts the raw data to specified data types and stores the converted data) to the electronic storage objects responsive to the second requests. The system further receives third requests to retrieve data from specified electronic storage objects, and retrieves data from the specified electronic storage objects responsive to the third requests, the retrieved data being in specified data types.

  • Pub Date: 2015/30/09
  • Number: 09646003
  • Owner: Wolfram Research, Inc.
  • Location: Champaign, US
  • Details: Visit USPTO

Visit USPTO Page


Capturing data from a mobile device through group communication

Some aspects of what is described here relate to systems, devices, and computer-implemented methods for capturing data related to a mobile device in a wireless network. In one example, a method may include receiving, at a first mobile device, data capture configuration information from a wireless network. The data capture configuration information indicates a target mobile device from which data is to be captured during group communication between the first mobile device and the target mobile device. Thereafter, in response to detecting a group communication between the first mobile device and the target mobile device, a data element is stored in a local memory of the first mobile device. The data element includes information from the group communication between the first mobile device and the target mobile device. The data element is sent to the wireless network.

  • Pub Date: 2015/30/09
  • Number: 09622160
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Capturing data from a mobile device in an off-network environment

Some aspects of what is described here relate to systems, devices, and computer-implemented methods for capturing data related to a mobile device in a wireless network. In one example, a method may include receiving, at a mobile device, data capture configuration information from a wireless network, the data capture configuration information indicating a data type to be captured from the mobile device in an off-network environment. Thereafter, in response to detecting the off-network environment at the mobile device, a data element is stored in a local memory of the mobile device. The data element corresponds to the data type indicated by the data capture configuration information. The data element is sent to the wireless network, for instance, when the mobile device has access to the wireless network.

  • Pub Date: 2015/30/09
  • Number: 09642030
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Automatic task classification based upon machine learning

A system and method is provided that processes a training database of human-generated requests in each of a plurality of task categories with a machine learning algorithm to develop a task classifier model that may be applied to subsequent user requests to determine the most likely one of the task categories for the subsequent user request.

  • Pub Date: 2015/30/09
  • Number: 09471887
  • Owner: NTT DOCOMO Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for registering, configuring, and troubleshooting printing devices

An example embodiment may involve discovering a plurality of printing devices on a local area network. The example embodiment may also involve determining a registration status for each of the plurality of printing devices on the local area network, where the registration status indicates whether each of the plurality of printing devices is registered with a registration server located outside the local area network. The example embodiment may further involve attempting to register each of the plurality of printing devices for which the registration status indicates the printing device is not registered with the registration server.

  • Pub Date: 2015/29/09
  • Number: 09582233
  • Owner: KYOCERA Document Solutions Inc.
  • Location: , JP
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing calls

A computer-implemented method for managing calls in a collaboration environment is provided. The method includes receiving, by a processor, a call into a collaboration session of the collaboration environment. The method also includes identifying, by the processor, a user from a plurality of users associated with the collaboration session, based on at least one of contextual information regarding the call and information regarding the plurality of users. The method further includes providing, by the processor, an interface on a device associated with the identified user, wherein the interface enables the identified user to instruct the device to handle the call within the collaboration session.

  • Pub Date: 2015/29/09
  • Number: 09521173
  • Owner: RINGCENTRAL, INC.
  • Location: Belmont, US
  • Details: Visit USPTO

Visit USPTO Page


Processing event messages for user requests to execute program code

A service manages a plurality of virtual machine instances for low latency execution of user codes. The service can provide the capability to execute user code in response to events triggered on an auxiliary service to provide implicit and automatic rate matching and scaling between events being triggered on the auxiliary service and the corresponding execution of user code on various virtual machine instances. An auxiliary service may be configured as an event triggering service to detect events and generate event messages for execution of the user codes. The service can request, receive, or poll for event messages directly from the auxiliary service or via an intermediary message service. Event messages can be rapidly converted to requests to execute user code on the service. The time from processing the event message to initiating a request to begin code execution is less than a predetermined duration, for example, 100 ms.

  • Pub Date: 2015/29/09
  • Number: 09483335
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Power saving techniques for a navigation application

A method of conserving power for a navigation application of a device is provided. The method determines a time for timely departure to an event that is stored in a calendar application of the device. The time for timely departure is determined based on the starting time of the event and an estimated travel time from the current location of the device to the location of the event. The method provides the time for timely departure to the calendar application. The method calculates the time for providing an update to the time for timely departure based on the remaining time before the time for timely departure. The method hibernates the navigation application until the time for providing the update. The method repeats the determining, providing, calculating, and hibernating several times.

  • Pub Date: 2015/29/09
  • Number: 09652486
  • Owner: APPLE INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Package exchange and service system using a key fob simulator

A key fob simulator for sending actuation command to a vehicle is discussed. The key fob has memory buffers, processors, and a transceiver that uses wireless communications to communicate with a backend cloud-based system. A RF transmitter of the key fob can transmit RF signals to Remote Keyless Entry (RKE) module of the vehicle. A mapping module includes a map-calculating circuit to calculate map coordinates of the key fob. A security module can receive a rolling security key of the RKE module of the vehicle. The key fob includes buttons that can be pushed by a user of the key fob to generate actuation commands by the security module. Using the RF transmitter, an actuation command and the rolling security key can be sent from security module to the RKE module of the vehicle. The RKE module then executes the actuation command after validating the rolling security key.

  • Pub Date: 2015/29/09
  • Number: 09508204
  • Owner: Continental Intelligent Transportation Systems, LLC
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for remote access control

A method to learn and then pair with a pre-installed access control system of a vehicle is discussed. Communication is exchanged between the access control system and a backend cloud-based system. Required data of the access control system including its particular authentication code is extracted by a learning device. A vehicle matching data is sent to the backend cloud-based system and the vehicle is registered with the backend cloud-based system. The learning device is registered to the access control system in accordance with learning procedures implemented in the vehicle as remote entry key. The learning device is coupled to a Radio Frequency signal transmitter that has Application-Specific Integrated Circuits to generate stable RF signals at multiple frequency wavelengths. Registration of learning device includes, receiving a first access control telegram message, transmitting the first access control telegram message to the access control system, pairing the learning device with the access control system.

  • Pub Date: 2015/29/09
  • Number: 09483886
  • Owner: Continental Intelligent Transportation Systems, LLC
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Indoline compounds as granzyme B inhibitors

Granzyme B inhibitor compounds, compositions that include the compounds, and methods for using the compounds. The compounds of the invention have advantageous water solubility and effectively inhibit Granzyme B.

  • Pub Date: 2015/29/09
  • Number: 09605021
  • Owner: viDA Therapeutics Inc.
  • Location: Vancouver, CA
  • Details: Visit USPTO

Visit USPTO Page


Event-driven computing

A service manages a plurality of virtual machine instances for low latency execution of user codes. The service can provide the capability to execute user code in response to events triggered on various event sources and initiate execution of other control functions to improve the code execution environment in response to detecting errors or unexpected execution results. The service may maintain or communicate with a separate storage area for storing code execution requests that were not successfully processed by the service. Requests stored in such a storage area may subsequently be re-processed by the service.

  • Pub Date: 2015/29/09
  • Number: 09652306
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Conversation assistance system

Systems and methods for providing conversation assistance include receiving from at least one user device of a user, conversation information and determining that the conversation information is associated with a conversation involving the user and a first person that is associated with first conversation assistance information in a non-transitory memory. Body measurement data of the user is retrieved from the at least first user device. A need for conversation assistance in the conversation involving the user and the first person is detected using the body measurement data. First conversation assistance information associated with the first person is retrieved from the non-transitory memory. The first conversation assistance information associated with the first person is provided through the at least one user device.

  • Pub Date: 2015/29/09
  • Number: 09635167
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Conference call information sharing via interaction with social networking data

Examples of associating user information from social network sites with a conference call application may include a series of operations. One example operation may provide receiving a command to share at least one social networking application with a scheduled conference call and accessing an application programming interface (API) of the social networking application, and sharing user profile information with a graphical user interface (GUI) application of the scheduled conference call corresponding to the command to share the social networking application.

  • Pub Date: 2015/29/09
  • Number: 09407772
  • Owner: West Corporation
  • Location: Omaha, US
  • Details: Visit USPTO

Visit USPTO Page


Using core files to develop diagnostic programs

A list of classes found in a core dump file is determined. One or more classes requested by a classloader is also determined. A set of one or more classes requested by the classloader that are found in the core dump file is then determined.

  • Pub Date: 2015/28/09
  • Number: 09588873
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Trusted computing host

A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing environment. The trusted host computing device can communicate with one or more host computing devices that host virtual machines to provide a number of security-related functions, including but not limited to boot firmware measurement, cryptographic key management, remote attestation, as well as security and forensics management. The trusted computing host maintains an isolated partition for each host computing device in the environment and communicates with peripheral cards on host computing devices in order to provide one or more security functions.

  • Pub Date: 2015/28/09
  • Number: 09576155
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for monitoring data activity utilizing a shared data store

In accordance with embodiments, there are provided mechanisms and methods for monitoring data activity utilizing a shared data store. These mechanisms and methods for monitoring data activity utilizing a shared data store can enable enhanced data monitoring, more efficient data storage, improved system resource utilization, etc.

  • Pub Date: 2015/28/09
  • Number: 09607034
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System architectures with data transfer paths between different memory types

A system can include a first memory section comprising a plurality of volatile memory cells; a second memory section comprising a plurality of nonvolatile memory cells; a first data path configured to transfer data between the first and second memory sections; an interface circuit coupled to receive access commands and address values, the interface circuit configured to determine if a data transfer operation is occurring in the device, and if the data transfer operation is occurring, accessing the address in the first memory section or accessing a location in the second memory section based on a select value, and if the data transfer operation is not occurring, accessing the address in the first memory section; and a compare circuit configured to compare a received address to a predetermined value to generate the select value.

  • Pub Date: 2015/28/09
  • Number: 09455036
  • Owner: Adesto Technologies Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Social cache

Various embodiments relating to a social cache replacement policy are described. The techniques of the present invention disclosed utilize social network properties to guide a cache replacement policy executed by a social networking platform system. In one embodiment, a method is provided for determining a queue location to cache a data item based on a popularity score computed from social network properties. In one embodiment, a method is provided for computing the popularity score by incorporating a user's social network properties and the user's friends' social network properties. In embodiments, the popularity score may be computed using a plurality of social network properties, which may include social network properties associated with (i) the user, (ii) the consumer(s), and/or (iii) the data item(s). In embodiments, a plurality of popularity scores are maintained in a user-score database, where the plurality of popularity scores are periodically updated using historical data.

  • Pub Date: 2015/28/09
  • Number: 09342464
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing a SIP server

A method, system and computer program product are described for managing network communications to a Session Initiation Protocol (SIP) server capable of SIP processing using a SIP stack. A data packet is received from a network device. It is determined, from the data packet, whether the network device is a device recognized by the SIP server. Responsive to this determination, and before SIP processing using the SIP stack, it is determined whether the data packet conforms to a permitted configuration. The permitted configuration includes that data of the data packet indicates an unfragmented User Datagram Protocol (UDP) packet and that data indicative of SIP data in the received data packet matches a parsing rule. If the data packet conforms to the permitted configuration, it is passed to the SIP stack, if not it is discarded.

  • Pub Date: 2015/28/09
  • Number: 09641561
  • Owner: METASWITCH NETWORKS LTD
  • Location: Enfield, GB
  • Details: Visit USPTO

Visit USPTO Page


In-line filtering of insecure or unwanted mobile device software components or communications

Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.

  • Pub Date: 2015/28/09
  • Number: 09531744
  • Owner: Appthority, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Content filtering for personal productivity applications

A set of context profiles containing profile content rules for filtering which content within a set of personal productivity applications (such as e-mail, chat, calendar, and contacts applications) is accessible by a user. Content rules support filtering content by, for example, content originator, and/or subject matter. The context profiles are centrally maintained for control of integrated, non-integrated, and/or independently administered personal productivity applications.

  • Pub Date: 2015/28/09
  • Number: 09418162
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for securely logging boot-tampering actions

The disclosed apparatus may include a storage device and a secure counter. The apparatus may also include a tamper-logging component that (1) detects an action that is associated with booting untrusted images from the storage device and, in response to detecting the action, (2) securely logs the action by incrementing the secure counter. Various other apparatuses, systems, and methods are also disclosed.

  • Pub Date: 2015/28/09
  • Number: 09563774
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Database mapping of models for reporting tools in model driven development

Embodiments of the present invention provide a method, system and computer program product for mapping models to relational databases for reporting tools. In an embodiment of the invention, a model mapping method for models of a model driven development (MDD) environment can include initializing a database table and selecting a data source storing a modeling framework representation of a model. A first query can be executed against an application programming interface (API) of the data source supporting a modeling framework query language to retrieve selected elements of the model. Likewise, a second query can be executed against the API of the data source to retrieve selected attributes of the selected elements of the model. Finally, rows of the database table can be populated with the retrieved selected elements of the model and corresponding columns of the database table can be populated with the retrieved selected attributes of the selected elements of the model. Consequently, a report can be generated for the model based upon the rows and columns of the database table.

  • Pub Date: 2015/27/09
  • Number: 09552441
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Servers, switches, and systems with switching module implementing a distributed network operating system

One networking device includes a switch module, a server, and a switch controller. The switch module has ports with a communications interface of a first type (CI1) and ports with a communications interface of a second type (CI2). The server, coupled to the switch module via a first CI2 coupling, includes a virtual CI1 driver, which provides a CI1 interface in the server, defined to exchange CI1 packets with the switch module via the first CI2 coupling. The virtual CI1 driver includes a first network device operating system (ndOS) program. The switch controller, in communication with the switch module via a second CI2 coupling, includes a second ndOS program controlling, in the switch module, a packet switching policy defining the switching of packets through the switch module or switch controller. The first and second ndOS programs exchange control messages to maintain a network policy for the switch fabric.

  • Pub Date: 2015/25/09
  • Number: 09621482
  • Owner: Pluribus Networks Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Managing technology resources across multiple platforms

The present invention extends to methods, systems, and computer program products for managing technology resources across multiple platforms. Embodiments of the invention can be used to manage the configuration of a plurality of different devices. A management server/service can utilize native management capabilities of different devices to provide configuration management without requiring agents to be installed on the devices. In general, the management server/service adapts to the unique characteristics and behaviors of different devices, platforms, and external systems to provide configuration management for the different devices, platforms, and external systems. As such, configuration management can be provided in a unified fashion across different platforms, both on-premise and off-premise, and indirectly. When client agents are present, the management server/service can adjust to compatibly operate with the client agents.

  • Pub Date: 2015/25/09
  • Number: 09509564
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Managed access system with mobile wireless device geolocation capability

A managed access system for mobile wireless devices (MWDs) in a facility that is geographically within a wireless communications network includes a plurality of antennas arranged at the facility. Radio equipment is coupled to the antennas. A management access controller cooperates with the radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD. The management access controller cooperates with at least one MWD geolocation device to locate the given MWD within the facility.

  • Pub Date: 2015/25/09
  • Number: 09584252
  • Owner: HARRIS CORPORATION
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus having communication means and a receiving member for a chip card

The invention relates to an apparatus () which comprises a receiving member () configured to receive a chip card (). The chip card () is configured for contactless communication with a first hardware interface (). The apparatus () further comprises communication means () configured to enable contactless communication with a second hardware interface (), wherein the first hardware interface () and the second hardware interface () are hardware interfaces of different types. The communication means () are configured to enable a communication of the communication means () with the chip card () when the chip card () is received in the receiving member ().

  • Pub Date: 2015/25/09
  • Number: 09633300
  • Owner: certgate GmbH
  • Location: Nürnberg, DE
  • Details: Visit USPTO

Visit USPTO Page


Adaptive speed data collection

A mobile device is arranged to perform an adaptive speed data collection method. A host application running on the mobile device cooperates with a background service also running on the mobile device. The background service is arranged as a state machine. On each pass through the state machine, quality of service (QoS) data associated with a particular wide area network, such as a cellular network, is collected. Also on each pass through the state machine, a sample time value is calculated based on a plurality of asserted triggers and rules applied to the asserted triggers. An alarm is loaded with the sample time value, and the background service is suspended until the alarm expires or an interrupt is asserted. The asserted interrupt begins a new sequential pass through the state machine.

  • Pub Date: 2015/25/09
  • Number: 09641264
  • Owner: Root Wireless, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Web portal API test report generation

A system for generating application programming interface (“API”) test reports for a software application derives one or more Java APIs to be tested from the software application and derives Java Unit (“JUnit”) test methods used to test the Java APIs. The system then maps each Java API with a corresponding JUnit test method and generates one or more test reports.

  • Pub Date: 2015/24/09
  • Number: 09417992
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System for on-site management of an event

A system includes a gatekeeper system for validating ticket information for a plurality of attendees of an event, the gatekeeper system being operable to communicably connect by a wireless connection signal to mobile check-in devices, and one or more mobile check-in devices communicably connected to the gatekeeper system, each mobile check-in device being operable to receive ticket identifiers for attendees of the event and to transmit the ticket identifiers for the attendees to the gatekeeper system.

  • Pub Date: 2015/24/09
  • Number: 09563859
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable pH buffers

A programmable pH buffer comprises a copolymer that changes pKat a lower critical solution temperature (LCST) in water. The copolymer comprises a thermally programmable polymer that undergoes a hydrophobic-to-hydrophilic phase change at the LCST and an electrolytic polymer that exhibits acid-base properties that are responsive to the phase change. The programmable pH buffer can be used to sequester COinto water.

  • Pub Date: 2015/24/09
  • Number: 09550168
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for cluster-based video monitoring and event categorization

A computing system obtains a respective motion vector for each of a series of motion event candidates in real-time as said each motion event candidate is detected in a live video stream. In response to receiving the respective motion vector for each of the series of motion event candidates, the computing system determines a spatial relationship between the respective motion vector of said each motion event candidate to one or more existing clusters established based on a plurality of previously processed motion vectors, and in accordance with a determination that the respective motion vector of a first motion event candidate of the series of motion event candidates falls within a respective range of at least a first existing cluster of the one or more existing clusters, assigns the first motion event candidate to at least a first event category associated with the first existing cluster.

  • Pub Date: 2015/24/09
  • Number: 09489580
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for automatically creating message

A method and an apparatus for automatically creating a message in an electronic device are provided. The method includes detecting at least one current situation of a user of the electronic device and automatically creating a message comprising content reflecting the at least one current situation.

  • Pub Date: 2015/24/09
  • Number: 09615229
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Integrating two-dimensional bar codes and embedded links with call center operation

In various embodiments, advertising campaigns can be defined that incorporate technologies such as two-dimensional bar codes or embedded links in electronic material, for directing a user to communicate with a call center. For instance, in particular embodiments, the reading of a two-dimensional bar code by a user with a smart phone may cause various forms of communication requesting a return communication. The communication from the smart phone may be sent to, and received at, the call center, where a calling campaign associated with an advertising campaign is identified using information associated with the communication. A responding communication may be initiated from the call center to the user.

  • Pub Date: 2015/24/09
  • Number: 09374459
  • Owner: NOBLE SYSTEMS CORPORATION
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Computing device with force-triggered non-visual responses

In one example, a method includes receiving, by a computing device, an indication of a detected force applied to the computing device. The method further comprises determining, by the computing device, that the detected force matches a corresponding input that the computing device associates with a corresponding function that is executable by the computing device. The method further comprises generating, by the computing device and in response to determining that the detected force matches the corresponding input and, a non-visual output based on the corresponding function.

  • Pub Date: 2015/24/09
  • Number: 09519345
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for assigning tasks based on usage patterns and resource capacities

Techniques relate to facilitating assignments of tasks to promote efficient resource timetables. A first communication from a client device is received that corresponds to an electronic request to sue a resource to complete a task. A task type of the task and a client corresponding to the electronic request are identified. Usage data corresponding to the task type and client are identified. A task-assignment duration is defined based on the usage data and a buffer time period. An availability in a timetable of a resource that is of a duration that is at least as long as the task-assignment duration is identified. A second communication identifying a start time of the availability is transmitted to the client device. A third communication is received that accepts the start time, and a fourth communication is transmitted to a device controlling use of the resource that identifies the client, task and availability.

  • Pub Date: 2015/23/09
  • Number: 09614784
  • Owner: HCA Holding, Inc.
  • Location: Nashville, US
  • Details: Visit USPTO

Visit USPTO Page


Electronically binding to a lost mobile device

The first mobile device determining that the first mobile device is lost and the first mobile device, in response to determining that the first mobile device is lost, activating a secure mode on the first mobile device. The first mobile device making the first mobile device discoverable to other mobile devices. The first mobile device electronically binding to a second mobile device. The first mobile device sending information relating to the first mobile device to the second mobile device. The first mobile device receiving an indication that the first mobile device is no longer lost. The first mobile device, in response to receiving the indication that the first mobile device is no longer lost, unbinding from the second mobile device.

  • Pub Date: 2015/23/09
  • Number: 09451465
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Computing session workload scheduling and management of parent-child tasks where parent tasks yield resources to children tasks

A single workload scheduler schedules sessions and tasks having a tree structure to resources, wherein the single workload scheduler has scheduling control of the resources and the tasks of the parent-child workload sessions and tasks. The single workload scheduler receives a request to schedule a child session created by a scheduled parent task that when executed results in a child task; the scheduled parent task is dependent on a result of the child task. The single workload scheduler receives a message from the scheduled parent task yielding a resource based on the resource not being used by the scheduled parent task, schedules tasks to backfill the resource, and returns the resource yielded by the scheduled parent task to the scheduled parent task based on receiving a resume request from the scheduled parent task or determining dependencies of the scheduled parent task have been met.

  • Pub Date: 2015/23/09
  • Number: 09658887
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Business event processing

In one example, an apparatus comprises processors to execute a business event processing module. The module is configured to receive a request to perform an operation on a first listing in a set of listings and identify, in the set of listings, additional listings having certain characteristics in common with the first listing. The operation is automatically performed on the additional listings and a performance of the operation on a last instance of the additional listings is determined by a last event processor.

  • Pub Date: 2015/23/09
  • Number: 09589286
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for conducting transactions with a customer using text messages

The illustrative embodiments described herein provide systems and methods for conducting transactions with a customer using text messages. In one embodiment, a method includes receiving a first text message from a mobile communication device associated with a customer. The first text message includes a request from the customer to receive one or more text messages from a vendor. The method also includes adding the customer to a set of consenting customers in a customer database in response to receiving the first text message. The set of consenting customer including customers that consent to receiving text messages from the vendor. The method also includes sending a second text message to the mobile communication device. The second text message is associated with a service offered by the vendor.

  • Pub Date: 2015/22/09
  • Number: 09607345
  • Owner: West Corporation
  • Location: Omaha, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating and protecting secrets for a plurality of groups

A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.

  • Pub Date: 2015/22/09
  • Number: 09411972
  • Owner: PACID TECHNOLOGIES, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Soft decision analyzer and method

A soft decision analyzer system is operable to interconnect soft decision communication equipment and analyze the operation thereof to detect symbol wise alignment between a test data stream and a reference data stream in a variety of operating conditions.

  • Pub Date: 2015/22/09
  • Number: 09450747
  • Owner: The United States of America as represented by the Administrator of the National Aeronautics and Space Administration
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Creation and management of RFID device versions

The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency Identification (RFID) devices. The system can include components that detect whether a device has joined the network and based at least in part on such indication creates a device profile the first time that the device is detected, establishes a version trail containing configuration settings specific to the detected device, and thereafter builds and maintains the version trail when the device joins and/or leaves the network.

  • Pub Date: 2015/22/09
  • Number: 09330288
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive runtime for a multiprocessing API

A computer-implemented method includes selecting a runtime for executing a program. The runtime includes a first combination of feature implementations, where each feature implementation implements a feature of an application programming interface (API). Execution of the program is monitored, and the execution uses the runtime. Monitor data is generated based on the monitoring. A second combination of feature implementations are selected, by a computer processor, where the selection is based at least in part on the monitor data. The runtime is modified by activating the second combination of feature implementations to replace the first combination of feature implementations.

  • Pub Date: 2015/22/09
  • Number: 09465714
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing environmental conditions

Disclosed are systems and methods for adjusting environmental conditions within a physical structure comprising a plurality of linked commissioned units. One or more occupancy sensors (--) produce data indicating that a designated zone has transitioned from an unoccupied state to an occupied state. A first one or more luminaires (--) associated with a first one of the plurality of linked commissioned units (D), produces a background level of illumination within a predetermined reaction period following the production of the sensor data. The first one of the plurality of linked commissioned units transmits data indicative of the state change of the designated zone, and at least a second one of the plurality of linked commissioned units receives the data indicative of the state change, and causes at least a second one or more luminaires to alter illumination.

  • Pub Date: 2015/21/09
  • Number: 09497832
  • Owner: PHILIPS LIGHTING HOLDING B.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Sensitive data protection during user interface automation testing systems and methods

There is provided systems and method for sensitive data protection during user interface automation testing. A user may transmit sensitive data to the test website framework, where the sensitive data is encrypted as a data key. The encrypted data key is set by an administrator of the test website and given to the user. The user may enter the key, where the test website framework application utilizes a conversion kit to decrypt the encrypted data key for use in the website user interface automation test. However, the encrypted data key is pulled into a version control system and/or viewed in test results so that the sensitive data remains hidden from view. In various embodiments, the encrypted data key may be entered into a web element, such as a password field, where the password field displays only the encrypted data key during test results.

  • Pub Date: 2015/21/09
  • Number: 09501657
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for directly mapping web services interfaces and Java interfaces

A method and system for directly mapping web services interfaces and Java interfaces. In one embodiment, default mapping information is identified, the default mapping information having default interface mapping information and default schema to Java mapping information. The default mapping information is then update and a mapping descriptor having the updated mapping information is generated. The updated information contains updated interface mapping information and updated schema to Java mapping information.

  • Pub Date: 2015/21/09
  • Number: 09280527
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Maintaining a secure computing device in a test taking environment

The presently disclosed invention provides for the security of a computing device in the context of a test taking environment. By securing a computing device, an individual (or group of individuals) may more effectively proctor a large examination without worrying about a test taker illicitly accessing information on their computer or via a remote source of data. Securing a computing device includes locking out or preventing access to any application not deemed necessary or appropriate by the test administrator.

  • Pub Date: 2015/21/09
  • Number: 09430951
  • Owner: Kryterion, Inc.
  • Location: Phoenix, US
  • Details: Visit USPTO

Visit USPTO Page


Internet protocol security camera connected light bulb/system

The present invention concerns an apparatus comprising a shade, a camera sensor and a base. The camera sensor may be configured to capture video data of a surrounding environment of the apparatus. The base may be configured to enclose a circuit. The circuit may be configured to provide (i) an electrical connection to (a) the camera sensor and (b) components of the circuit, (ii) a connection between a power source and an external device, and (iii) control signals for activation of (a) the external device and (b) the components of the circuit. The circuit comprises an antenna module configured to connect and send data to a network through a wireless connection. The video data is sent as the data through the wireless connection. The camera sensor is positioned in a bottom part of the base that extends below the shade.

  • Pub Date: 2015/21/09
  • Number: 09654678
  • Owner: Kuna Systems Corporation
  • Location: Burlingame, US
  • Details: Visit USPTO

Visit USPTO Page


Error injection into the leaf functions of call graphs

A computer determines if an instance of a target in a call graph of a program being tested satisfies two or more parameters required for error injection. The computer responds to the determination that the instance of the target does satisfy the two or more parameters required for error injection, by injecting a first instance of an error into a leaf function of the call graph. Executing the first instance of the injected error results in returning to a first code path of the program being tested.

  • Pub Date: 2015/21/09
  • Number: 09471476
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Clothing and body covering pattern creation machine and method

Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing. When applied to clothing, the image displays the portion of the tattoo that is covered by the clothing, or may extend the appearance of the tattoo from the skin to the adjacent clothing.

  • Pub Date: 2015/21/09
  • Number: 09311736
  • Details: Visit USPTO

Visit USPTO Page


Fantasy sports transition score estimates

Techniques for fantasy sport score reporting include progressively updating an estimated score for a team of fantasy players. A fantasy football team includes athletes that play for professional football teams. Performance of the athletes in their real life games earns each athlete points, which aid the fantasy teams with which they are associated. In a game between the two fantasy teams, an initial estimated score is provided, based on information about the athletes' past performances. As real life games are played by the athletes, how well certain athletes performed, and therefore portions of the estimated score, become known. As the information becomes known, the estimated score is refined. Thus, as real life games progress, estimated fantasy point information becomes a progressively better estimate of the actual/eventual fantasy game score. Ultimately, the estimated score is completely replaced with an actual score.

  • Pub Date: 2015/20/09
  • Number: 09463388
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for monitoring and maintaining consistency of a configuration

The present application is directed towards systems and methods for monitoring and maintaining consistency of a configuration across a plurality of cores or packet engines in a multi-core system. A configuration manager handles communication of configuration commands to a plurality of cores or packet engines. If a command executes successfully on a first packet engine but fails on a second packet engine, the configuration manager may communicate an undo command to the first packet engine. Successful execution of the undo command may restore the packet engines to a consistent configuration.

  • Pub Date: 2015/18/09
  • Number: 09645835
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time data management for a power grid

A real-time data management system, a system, method, apparatus and tangible computer readable medium for accessing data in a power grid are described for controlling a transmission delay of real-time data delivered via a real-time bus, and for delivering real-time data in a power grid. A unified data model covering various organizations and various data resource is described. Further, a management scheme for clustered data is described to provide a transparent and high speed data access. The solutions described may efficiently manage the high volume of real-time data and events, provide data transmission with a low latency, provide flexible extension of both the number of data clusters and the number of databases to ensure high volume data storage, and achieve a high speed and transparent data access. Additionally, rapid design and development of analytical applications, and the near real-time enterprise decision-making business may be enabled.

  • Pub Date: 2015/18/09
  • Number: 09501555
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Providing messages for a Java message service

Providing messages for Java message service (JMS) is disclosed. A described method includes determining timestamp information associated with a first Java™ message service (JMS) message. The timestamp information represents a time when the JMS message is either generated or received by a processing device. The method also includes determining destination information associated with the JMS message. The method further includes converting the JMS message into a first key-value data pair having a key data and a value data. The key data includes the timestamp information and the value data includes the destination information of the first JMS message.

  • Pub Date: 2015/18/09
  • Number: 09454589
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Global management of tiered storage resources

Provisioning storage resources for customers from a distributed grid of disparate storage systems is presented herein. A storage tier component can sort, based on attributes of heterogeneous computer-readable storage media, the heterogeneous computer-readable storage media into tiers of storage to facilitate provisioning a portion of storage space of a tier of the tiers for a computing resource. Further, the storage tier component can receive an input from a device for provisioning of the portion of the storage space of the tier, and configure, based on the input, a storage resource to facilitate access between the portion of the storage space of the tier and the computing resource. Furthermore, a tracking component can create an account associated with a customer that is associated with the device to facilitate tracking and/or limiting of utilization of the portion of the storage space of the tier by the customer.

  • Pub Date: 2015/18/09
  • Number: 09578100
  • Owner: OS NEXUS, INC.
  • Location: Mercer Island, US
  • Details: Visit USPTO

Visit USPTO Page


Automated insider threat prevention

Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider threat prevention includes monitoring network communications at a network device; detecting an anomalous activity based on the monitored network communications associated with a user based on a behavior profile for the user; and performing an action in response to the detected anomalous activity based on a policy.

  • Pub Date: 2015/18/09
  • Number: 09641544
  • Owner: Palo Alto Networks, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing television and video programming through social networking

In particular embodiments, one or more computer systems of a social-networking system determine information associated with a product displayed on a display device and access a database of known products. The one or more computer systems of the social-networking system determine, by comparing the database of known products with the determined information associated with the product, an identity of the product displayed on the display device. The one or more computer systems of the social-networking system provide one or more instructions to display media content related to the identified product.

  • Pub Date: 2015/17/09
  • Number: 09491133
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Power reduction for image sensor with raw image scaler

A system and method for scaling an image includes receiving raw image data comprising input pixel values which correspond to pixels of an image sensor, filtering pixels in a spatial domain, and filtering pixels in a frequency domain according to an oversampling ratio. The system and method may also include outputting scaled image data as output pixel values, which correspond to subgroups of the input pixel values. The filtering may be done according to a Bayer-consistent ruleset which includes a set of filter weights and a series of scaling rules. The oversampling ratio is set to minimize an error after the filtering in the spatial domain and the filtering in the frequency domain.

  • Pub Date: 2015/17/09
  • Number: 09654711
  • Owner: Sony Semiconductor Solutions Corporation
  • Location: Kanagawa, JP
  • Details: Visit USPTO

Visit USPTO Page


Image building

An image is built. The building of an image includes selecting an image to be built, performing a hashing function on the image to produce a checksum, querying a registry for an existing image including the same checksum, and if no existing image including the same checksum is found, acquiring a parent image for the image to be built, building the image to produce a built image, adding the checksum for the image to the built image, and storing the built image in the registry.

  • Pub Date: 2015/17/09
  • Number: 09639558
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Expertise discovery in social networks

A method and system of expertise discovery in social networks accesses behavioral information associated with users' use of a computer-implemented social network, whereby the computer-implemented social network enables its users to have subscribing relationships with other users. Expertise levels of users of the social network with respect to one or more topics are automatically inferred from the behavioral information. The behavioral information may comprise interactions by other users with respect to content published by a user. The expertise levels of users may be inferred in accordance with the expertise levels of other users who are subscribed to them. Recommendations of users based on their expertise levels may be delivered, as well as explanations for the recommendations. Expertise levels of multiple users and/or expertise levels of a user over time may be delivered for display.

  • Pub Date: 2015/17/09
  • Number: 09454730
  • Owner: ManyWorlds, Inc.
  • Location: Brenham, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized refraction and astigmatism determination

The present disclosure relates generally to a system and method for determining the refractive error of a patient, more particularly determining the patient's refractive error by using a computerized screen, and providing the patient with a prescription for the patient's preferred type of corrective lenses. The system and method do not require the trip or expense of a doctor visit, and are optimized for convenience and cost effectiveness. In a general embodiment, the present disclosure provides a method for determining a corrective lenses prescription of a patient. The method includes, separately, for each eye of the patient, determining an astigmatism prescription for the patient via a computerized screen and without the use of a refractor lens assembly, including testing for a cylinder component and an axis component at the same time by presenting at least one diagram to the patient via the computerized screen and enabling the patient to select at least one input per diagram corresponding to a cylinder measurement and an axis measurement for the corrective lenses prescription for the patient.

  • Pub Date: 2015/17/09
  • Number: 09492074
  • Owner: Opternative, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking at least one object

Tracking at least one object is disclosed. Initially, four or more first images are received showing a first object. First static and dynamic characteristics and second static and dynamic characteristics of the first object are determined. The second static characteristic is compared to the first static characteristic and the second dynamic characteristic is compared to the first dynamic characteristic. It is then determined that the first object is moving.

  • Pub Date: 2015/16/09
  • Number: 09607214
  • Owner: CLOUDPARC, INC.
  • Location: Great Neck, US
  • Details: Visit USPTO

Visit USPTO Page


Presenting question and answer data in a social networking system

A social networking system includes a question and answer system that displays to a viewing user questions and answers provides by other users of the social networking system. The question and answer system may display answers to a particular question in a way that visually indicates both the global answer set and a subset of the global answer set, such as the viewing user's friends. The social networking system may also display to a viewing user news stories about another user asking or answering a question, where the format of the displayed new stories is based on an affinity that the viewing user has for the user who provided the question or answer mentioned in the news story. The displayed questions and/or answers may be associated with an object in the social networking system, where the user interface provides additional information about those objects.

  • Pub Date: 2015/16/09
  • Number: 09270716
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Location service management

An application manager of a mobile device can provide a user with the ability to control whether an application can use location information provided by a location subsystem of the mobile device. The application can request to be notified by the location subsystem when the mobile device crosses a geofence. When the mobile device crosses the geofence, the location subsystem provides a notice to the application. The application manager can intercept the notice to the application, and present an alert on a user interface. The application manager can then provide the notice to the application only upon receiving an input through the user interface confirming that the application still has permission to use location information.

  • Pub Date: 2015/16/09
  • Number: 09591443
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing system

An information processing system includes multiple network segments to which one or more information processors are connectable. The network segments includes a first network segment to which at least one first information processor configured to store predetermined information is connected, a second network segment to which at least one second information processor is connected, and a third network segment to which at least one third information processor is connected. The second network segment includes multiple predefined application programming interface (API)s, and the at least one second information processor executes a process corresponding to a called one of the APIs using the predetermined information stored in the at least one first information processor. In response to receiving a request from outside the information processing system, the at least one third information processor controls a process corresponding to the request by calling one of the APIs which corresponds to the request.

  • Pub Date: 2015/16/09
  • Number: 09398084
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Determination of customer presence based on communication of a mobile communication device digital signature

Systems, apparatus, and computer program products provide for monitoring an area within or proximate to a place of business for digital signatures of mobile communication devices, such as cellular devices or wearable communication devices. The captured digital signatures are then matched to digital signatures associated with existing customers of the business to determine the presence of the existing customer within or proximate to the place of business. Once the presence of the existing customer within or proximate to the business is known, the business can access other relevant information, such as customer profile information, prior transaction/interaction information or the like to enhance the customer's current interaction with the business. Moreover, once the presence of the existing customer is known, location determining mechanisms may implemented to track the location of the known customer within or proximate to the place of business for the purpose of positively identifying the known customer.

  • Pub Date: 2015/16/09
  • Number: 09514463
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Viewer traffic visualization platform

An example implementation includes a computer-implemented method including generating a dynamic user-interactable graphical interface using a performance summary including viewer traffic statistics for a first show and competing shows at discrete time intervals, the interface being configured to graphically display a comparison of performance of the first show and the competing shows at the discrete time intervals and provide the interface for display via on the user device. The method may also include receiving a user input selecting from the interface a time interval of the first show and the competing shows and updating the interface with the comparison of the viewer traffic between the first show and the competing shows at the time interval selected by the user input.

  • Pub Date: 2015/15/09
  • Number: 09467745
  • Owner: Domo, Inc.
  • Location: American Fork, unknown
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of managing communication endpoints

In one embodiment, a method includes receiving a trigger to dynamically modify a serving site of a communication endpoint, wherein the communication endpoint is registered to receive digital communication service from a first serving site. The method further includes determining a stored serving-site selection policy applicable to the communication endpoint. The method also includes selecting a second serving site for the communication endpoint based, at least part, on a stored serving-site selection policy. Also, the method includes determining endpoint-configuration requirements of the second serving site. Furthermore, the method includes dynamically generating endpoint configurations that satisfy the endpoint-configuration requirements of the second serving site. Moreover, the method includes writing the generated endpoint configurations to the communication endpoint. Additionally, the method includes causing the communication endpoint to register to receive digital communication service from the second serving site in place of the first serving site.

  • Pub Date: 2015/15/09
  • Number: 09591049
  • Owner: iNEMSOFT, Inc.
  • Location: Frisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for generating interactive content for in-page purchasing

The present solution relates to an improved system and method for providing interactive content. The present solution can provide a first content object for display in a content slot of an information resource of a content provider. The first content object can include one or more tags that can each be linked to a respective second content object of a plurality of second content object. When an interaction is received with a first tag the system can identify a second content object corresponding to the first tag. The second content object can be provided for display in the same content slot of the information resource. In some implementations, the second content object can include a transaction interface to purchase an item identified in the second content object.

  • Pub Date: 2015/15/09
  • Number: 09317881
  • Owner: ADORNO PUBLISHING GROUP, INC.
  • Location: Aptos, US
  • Details: Visit USPTO

Visit USPTO Page


System and method to sort messages exchanged in a wireless personal area network according to relative orientations and positions of sending and receiving devices

Apparatus and methods are described herein for sorting messages sent and received, for example in a wireless Personal Area Network (PAN), according to whether the receiving device is within a radially defined region of space. The space may be defined by one or more parameters set by the sending device. A wireless PAN may define the range of peer-to-peer transmission and reception of radio waves between at least two wireless devices. Location and orientation information may be transmitted by a communication device and combined with user and/or software defined boundary limits to filter short range wireless messages.

  • Pub Date: 2015/15/09
  • Number: 09485343
  • Owner: ZOKU, INC.
  • Location: Sausalito, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to reduce signaling power

System, methods and apparatus are described that reduce the power consumed by a multi-level encoded communications link. In one example, different logic states of a 4-level pulse amplitude modulation encoded transmission consume greater power than other logic states. The fraction of primary bits in a first logic state in multi-bit data symbols may determine whether the primary bits are inverted prior to transmission. The fraction of secondary bits in the first logic state in the multi-bit data symbols may determine whether the secondary bits are inverted prior to transmission. The primary bits may be swapped with the secondary bits is more secondary bits are in the first logic state than primary bits in the first logic state.

  • Pub Date: 2015/15/09
  • Number: 09621385
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Malware family identification using profile signatures

A potential malware sample is received from a security device at a server associated with a security cloud service. The sample is executed in a sandbox environment on the server, including by monitoring interaction of the sample with an application program interface (API), provided by the sandbox environment, in order to obtain an API log. It is determined whether the sample is associated with a known malware family including by determining, based at least in part on the API log, if the sample created an executable file and if the sample registered the executable file in a run key. If it is determined that the sample is associated with a known malware family, then an alert is generated.

  • Pub Date: 2015/15/09
  • Number: 09542556
  • Owner: Palo Alto Networks, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of offline activity records and online data records

A method of collecting and indexing data by appending a tracking identifier (generated directly or indirectly by a tracking company) into a data file, wherein the data file is acquired from a computer system operated by a user. The data file could be data collected by a form made available through a website hosted by a web server. Additional data collected from other sources (stored as a record), such as a computer system operated by an agent, would be associated with the collected data file by an inquiry management company. The collected data and associated records are forwarded to a computer system that tracks online users and visitors. The process can many computer collected data (other than the data file) about website activity with other activities that are independent of the website.

  • Pub Date: 2015/15/09
  • Number: 09342843
  • Details: Visit USPTO

Visit USPTO Page


Apoptosis-inducing agent for the treatment of cancer and immune and autoimmune diseases

Disclosed are compounds which inhibit the activity of anti-apoptotic Bcl-2 proteins, compositions containing the compounds and methods of treating diseases during which is expressed anti-apoptotic Bcl-2 protein.

  • Pub Date: 2015/15/09
  • Number: 09493431
  • Owner: ABBVIE INC.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable storage device for providing a buy option in search results when user input is classified as having a purchase intent

Disclosed herein are methods for providing a buy option to search results in a generalized search engine. That one location for a search field can be a website, an application, a search bar in a web browser, etc. Rather than navigating to a website to perform a search in the context of that website, a user can instead navigate to or open a generalized search field. Via the generalized search field, the system can analyze the input from the user and the resulting context. A buy button can be included a search result to the user input in the input search field. Payment for an item can be processing using a payment account registered with the system with delivery coordinated with a separate merchant via an application programming interface.

  • Pub Date: 2015/14/09
  • Number: 09396491
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a single input field having multiple processing possibilities

Disclosed herein are methods for providing a buy option to search results in a generalized search engine. That one location for a search field can be a website, an application, a search bar in a web browser, etc. Rather than navigating to a website to perform a search in the context of that website, a user can instead navigate to or open a generalized search field. Via the generalized search field, the system can analyze the input from the user and the resulting context. A buy button can be included a search result to the user input in the input search field. Payment for an item can be processing using a payment account registered with the system with delivery coordinated with a separate merchant via an application programming interface.

  • Pub Date: 2015/14/09
  • Number: 09373138
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


Resolving conflicts within saved state data

Disclosed are various embodiments for synchronizing application state information across devices. More specifically, embodiments of the disclosure are related to resolving conflicts between application state information. A synchronization rule, an event name and/or event value are embedded within application state information obtained from devices associated with a user, from which conflicts can be resolved by an application synchronization service.

  • Pub Date: 2015/14/09
  • Number: 09536261
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Reducing virtual machine pre-emption in virtualized environment

A method for reducing virtual machine preemption in a virtualized environment is provided. The method includes dispatching a virtual central processing unit (CPU) to run in an emulation mode on a real CPU until the real CPU exits the emulation mode, determining whether the virtual CPU has loaded a wait state, determining whether a remaining time slice of the virtual CPU as a result of the dispatching is below a predefined threshold in an event that the virtual CPU has loaded the wait state and rescheduling the virtual CPU with a full time slice in an event the remaining time slice of the virtual CPU is below the predefined threshold.

  • Pub Date: 2015/14/09
  • Number: 09411630
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Protecting operating system configuration values using a policy identifying operating system configuration settings

In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings for the operating system is obtained. The operating system itself is prevented from changing this policy, but the policy can be changed under certain circumstances by components of the pre-operating system environment. The policy is compared to configuration values used by the operating system, and the operating system is allowed to boot with the configuration values if the configuration values satisfy the policy. However, if the configuration values do not satisfy the policy, then a responsive action is taken.

  • Pub Date: 2015/14/09
  • Number: 09424431
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Portable mechanical switch for selective deactivation of radio frequency identification circuits

Systems and methods for providing security for authentication devices—such as electronically readable cards or ID badges with embedded RFID chips or NFC capability—may include an envelope or pocket-like case for carrying an electronically readable card, having an electrically conductive, non-opaque sleeve that can be moved to cover or expose the electronically readable card and that prevents information on the card from being electronically read when covered yet still allows the card to be seen when covered. In one or more embodiments, the sleeve may be a wire mesh that is flexible enough to be compressed to expose the card yet stiff (or rigid) enough to be extended to cover the card and that is transparent enough to allow reading visual information on the surface of the card when covering the card. Protection can be switched off by a mechanical switch that leaves the protection normally on.

  • Pub Date: 2015/14/09
  • Number: 09572292
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Ontology based resource provisioning and management for services

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment.

  • Pub Date: 2015/14/09
  • Number: 09641618
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for alleviating statin myopathy

Disclosed herein are methods and compositions for alleviating side effects of statin administration, such as myopathic or myalgic side effects, short-term memory loss, abnormal liver function, glucose intolerance, hyperglycemia, increased risk for diabetes, or cumulative trauma disorder, comprising administration of β-hydroxy β-methylbutyrate (HMB) to an individual taking a statin. Also disclosed are methods and compositions for alleviating acute rhabdomyolysis comprising administration of HMB. The disclosure further provides uses of HMB in combination with a statin to alleviate side effects of statin administration.

  • Pub Date: 2015/14/09
  • Number: 09399026
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing information relating to an event

An organizer may send information relating to an event to participants via text messaging without having participants' texting numbers. Particularly, organizer may be associated with a texting number. Organizer sets event's start/end times, and provides email addresses for event invitees. Email requests invitees' texting numbers to participate in event. Texting numbers are stored, and encrypted respectively as identifiers. Organizer's message for participants is sent as text message to participants' texting numbers between event's start/end, and may be sent as if the message originated from organizer's texting number. When event ends, participants' texting numbers are deleted unless a participant participates in organizer's later ending event. In response to invitation to organizer's later event, a received participant's texting number may be encrypted as later identifier, and compared with identifier from earlier event. If a match, organizer's text message sent to participant during prior event is included in organizer's or participant's conversational history.

  • Pub Date: 2015/14/09
  • Number: 09590955
  • Owner: THE ROCKET SCIENCE GROUP LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for forensic data tracking

The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized devices and among authorized and unauthorized users.

  • Pub Date: 2015/14/09
  • Number: 09565200
  • Owner: Quick Vault, Inc.
  • Location: Cumming, US
  • Details: Visit USPTO

Visit USPTO Page


Low collateral damage tunable directional-lethality explosive fragmentation ammunition

A flexible warhead which can be used for a bunker defeat mechanism. The warhead has a polysterene membrane embedded with lethal tungsten alloy fragments, contains an explosive gel, and also has an attached time delay fuze. The warhead is folded and stored in a case. In use, the warhead is expelled from the case by a propellant and the membrane is exploded with its fragments proximate to impacting a target, after the time delay.

  • Pub Date: 2015/14/09
  • Number: 09528801
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Collaborative and distributed emergency multimedia data management

Systems, apparatus, and methods for collaborative and distributed emergency multimedia data management are described. In one aspect, a system includes a packet data reception interface. The system further includes a rules engine coupled with the packet data reception interface and configured to select a processing profile for packet data received, the rules engine further configured to associate packet data received with stored packet data. The system also includes a policy engine coupled with the rules engine and configured to execute the processing profile for packet data received.

  • Pub Date: 2015/14/09
  • Number: 09509842
  • Owner: Airbus DS Communications, Inc.
  • Location: Temecula, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for scalable structured data distribution

Systems and methods for efficiently absorbing, archiving, and distributing any size data sets are provided. Some embodiments provide flexible, policy-based distribution of high volume data through real time streaming as well as past data replay. In addition, some embodiments provide for a foundation of solid and unambiguous consistency across any vendor system through advanced version features. This consistency is particularly valuable to the financial industry, but also extremely useful to any company that manages multiple data distribution points for improved and reliable data availability.

  • Pub Date: 2015/11/09
  • Number: 09479556
  • Owner: Goldman, Sachs & Co.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for creating user interfaces for guiding the creation of modeling applications for forming and solving problems in a multiphysics modeling system

Systems and methods generate a modified application data structure that provides a customized modeling of physical systems in response to customized user inputs received via application feature(s) for new window form(s). The modified application data structure is generated from guided user inputs received through application builder wizard graphical user interface(s). The systems and methods include embedding a multiphysics model data structure in an initial application data structure and defining new window form(s). Window form data representing the defined new window forms is added to the initial application data structure. User-selectable application feature options are displayed in the application builder wizard graphical user interface(s) and application feature data is added to the initial application data structure to create a modified application data structure. The added application features can include data representing widget(s), form feature(s), and command sequence(s).

  • Pub Date: 2015/11/09
  • Number: 09372673
  • Owner: Comsol AB
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Shared geo-located objects

A method of reviewing geo-coded information at a geographic information system is disclosed. The method may include receiving information identifying a geo-located object from a submitter of the object, receiving information identifying the location of the geo-located object from the submitter, and receiving a request from a user of the geographic information system for one or more geo-located objects that includes the submitted geo-located object, and transmitting information for permitting display of the geo-located object to the user of the geographic information system.

  • Pub Date: 2015/11/09
  • Number: 09418164
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Facilitation of security employing a femto cell access point

One or more femto cell access points (FAPs) are employed to facilitate provisioning of security. A signal indicative of an intrusion in an area associated with an FAP can be received, and, based on receiving the signal, an identifier associated with a device in a detection range of the FAP can be determined. One or more frequencies in the detection range of the femto cell access point can be jammed, an attachment attempt emitted from the device in response to jamming the frequencies can be detected, and a telephone number of the device can be identified based, at least, on detecting the attachment attempt from the device. Warnings can also be sent to the device and/or tracking of the device can be performed.

  • Pub Date: 2015/11/09
  • Number: 09485051
  • Owner: AT&T MOBILITY II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Detection and prevention of installation of malicious mobile applications

A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.

  • Pub Date: 2015/11/09
  • Number: 09596257
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Data subscription management system

A method includes a digital subscription management system (DSMS) receiving from a source system a request to perform an edit of at least one data object, the DSMS sending a request for response (RFR) to subscribing systems having a copy of the at least one data object, the DSMS receiving a response from the subscribing systems, and the DSMS performing the edit.

  • Pub Date: 2015/11/09
  • Number: 09633069
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Vehicle status notification and operator identification

A computing system located on-board a vehicle issues an event notification responsive to detection of an event condition. The on-board computing system detects the presence of wireless-enabled devices located within the vehicle or within proximity to the vehicle over a wireless communications link. The on-board computing system seeks to determine the identity of one or more persons that enter, attempt to enter, or operate the vehicle based on identifiers obtained from one or more wireless-enabled devices carried by those persons. The on-board computing system distinguishes multiple users from each other by designating one user as the vehicle operator, and one or more other users as passengers of the vehicle. The on-board computing system may include a removable on-board interface device that interfaces with an on-board vehicle control system.

  • Pub Date: 2015/10/09
  • Number: 09489779
  • Owner: Moj.io Inc.
  • Location: Vancouver, CA
  • Details: Visit USPTO

Visit USPTO Page


System for encoding customer data

A rules engine stores customer data, a first rule comprising a first plurality of conditions, and a second rule comprising a second plurality of conditions, wherein the customer data is associated with a particular customer. The rules engine transforms a first portion of the customer data into a first code segment by applying the first rule and by satisfying a condition of the first plurality of conditions of the first rule. It also transforms a second portion of the customer data into a second code segment by applying the second rule and by satisfying a condition of the second plurality of conditions of the second rule. The rules engine further combines at least the first code segment and the second code segment to form a customer profile code. An interface engine communicatively coupled to the rules engine communicates the customer profile code to a third party.

  • Pub Date: 2015/10/09
  • Number: 09552586
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Non-pyrotechnic, non-lethal compressed gas disseminator

A non-pyrotechnic disseminator includes a body portion with a cover; a first compartment adjacent to the cover that is configured to hold disseminating materials; a chamber adjacent to the first compartment; a disk within the chamber and adjacent to the first compartment; a flow control device adjacent to the chamber opposite the disk; a second compartment adjacent to the flow control device and including a pin; an actuating mechanism connected to the pin; a third compartment adjacent to the second compartment opposite the flow control device that is configured to hold compressed gas; and a seal separating the second compartment from the third compartment. Actuation of the actuating mechanism causes the pin to break the seal causing release of the compressed gas into the second compartment and through the flow control device in a predetermined delayed timing, and then causing the compressed gas to burst the disk thereby pushing the disseminating materials out of the body portion by rupturing the cover.

  • Pub Date: 2015/10/09
  • Number: 09423225
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Memory corruption prevention system

In some embodiments, a memory corruption prevention process includes detecting a memory instruction of a program, where the memory instruction specifies a virtual memory address of data. The memory corruption prevention process further includes accessing, in response to the memory instruction, a translation lookaside buffer (TLB) using at least a portion of the virtual memory address. The memory corruption prevention process further includes, in response to accessing the TLB, obtaining a physical memory address corresponding to the virtual memory address, where the physical memory address corresponds to the data. The memory corruption prevention process further includes, in response to accessing the TLB, obtaining an authentication value corresponding to the physical memory address. The memory corruption prevention process further includes determining, using the authentication value, whether the memory instruction is authorized to proceed.

  • Pub Date: 2015/10/09
  • Number: 09639477
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent pursuit detection

Systems and methods may include receiving first motion data corresponding to a first object and receiving second motion data corresponding to a second object. The systems and methods may include determining whether the second object is following the first object based on the first motion data and the second motion data. The systems and methods may include receiving additional information corresponding to the second object. The systems and methods may include determining whether the second object poses a risk to the first object based on the additional information. The systems and methods may include performing processes in response to determining that the second object is following the first object and poses a risk to the first object. Such processes may include providing a notification to a subscribing party. The notification may indicate that the second object is following the first object and poses a risk to the first object.

  • Pub Date: 2015/10/09
  • Number: 09503860
  • Owner: CA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Authentication method and system

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

  • Pub Date: 2015/10/09
  • Number: 09280696
  • Owner: Copilot Ventures Fund III LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking the use of at least one destination location

Tracking the use of at least one destination location is disclosed. Initially, four or more first images are received from a first camera having a first field of view. It is then determined that the first vehicle is stopped within the at least one destination location at a first time and that the first vehicle has left the at least one destination location at a second time. A first characteristic of an occupant of the first vehicle based on a first image is determined to correspond to a second characteristic of the occupant of the first vehicle based on a second image. It is then determined that the occupant of the first vehicle traveled between the first vehicle and a payment station. Payment information specifying a period of time that was received by a third-party parking payment system is received. The period of time is then associated with the first vehicle.

  • Pub Date: 2015/09/09
  • Number: 09208619
  • Owner: CLOUDPARC, INC.
  • Location: Great Neck, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for nutrition analysis using food image recognition

The present disclosure provides a system and method for determining a nutritional value of a food item. The system and method utilizes a food container as a model to adjust various types of distortions that exists in an instant image of the food container that retains the food item. The instant image may be compared to the model image of the food container to correct any distortions. The food container includes a boundary which has a predetermined color. The predetermined color of the boundary can be used to adjust the color configuration of the instant image, thereby increasing the accuracy of the food identification.

  • Pub Date: 2015/09/09
  • Number: 09349297
  • Owner: Fitly Inc.
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Infrastructure for hosting and publishing software packages

A system and method for hosting and publishing software packages is disclosed. An example method includes receiving and storing artifacts related to a software development kit and metadata describing a version of the software development kit. The received artifacts and metadata may be converted into a package for the software development kit. The package may then be staged and the package's dependencies may be checked to ensure that the package's dependencies exist and that there are no conflicts with another staged package. The currently staged packages may then be tested to determine if there are any incompatibilities among the staged packages and access control information may be used to provide the currently staged packages in a common format to the appropriate users.

  • Pub Date: 2015/09/09
  • Number: 09632770
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic communications controller

Apparatuses, systems, methods, and computer program products are disclosed for a dynamic communications session controller. An identity module is configured to masquerade as a session endpoint to a session controller for a communications protocol using one or more network interfaces. An endpoint selection module is configured to dynamically select a destination for a session intended for a masqueraded session endpoint, based on information from one or more destinations. A routing module is configured to maintain and/or direct connectivity for a session with at least a selected destination using a communications protocol.

  • Pub Date: 2015/09/09
  • Number: 09584518
  • Owner: CALLWARE TECHNOLOGIES, INC.
  • Location: Sandy, US
  • Details: Visit USPTO

Visit USPTO Page


Data integrity checks

Aspects of the present disclosure relate to performing agnostic data integrity checks on source data, and based on the data integrity checks, generating a human-readable report that may be useable to identify specific errors or anomalies within the source data. Example embodiments involve systems and methods for performing the data integrity checks and generating the human-readable reports. For example, the method may include operations to ingest data from a source database through a data pipeline and into a local database, access the data from the data pipeline, determine a data type of the data, determine subtypes of data elements which make up the data, determine a count of each subtype, and generate a human-readable report, to be displayed at a client device.

  • Pub Date: 2015/09/09
  • Number: 09454564
  • Owner: Palantir Technologies Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Cytotoxic benzodiazepine derivatives

The invention relates to novel benzodiazepine derivatives with antiproliferative activity and more specifically to novel benzodiazepine compounds of formula (I)-(VII). The invention also provides conjugates of the benzodiazepine compounds linked to a cell-binding agent. The invention further provides compositions and methods useful for inhibiting abnormal cell growth or treating a proliferative disorder in a mammal using the compounds or conjugates of the invention.

  • Pub Date: 2015/09/09
  • Number: 09434748
  • Owner: ImmunoGen, Inc.
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Computing consumption of application programming interfaces

Various embodiments of systems and methods for computing consumption of application programming interfaces (APIs) are described herein. Initially at an integration agent, a subscription request is received from an API management system for subscribing to an API product. Next at the integration agent, a consumption policy associated with the subscribed API product is determined, from a plurality of consumption policies received from the API management system, wherein the consumption policy includes a plurality of pre-defined policies mapped with a plurality of API consumption plans. Next at the integration agent, an API consumption plan associated with the determined consumption policy, from the plurality of API consumption plans stored in an API consumption plan store is identified. Finally at the integration agent, a consumption data for the subscribed plurality of API product is computed based on the identified API consumption plan.

  • Pub Date: 2015/09/09
  • Number: 09645862
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Computer vision as a service

A computer vision service includes technologies to, among other things, analyze computer vision or learning tasks requested by computer applications, select computer vision or learning algorithms to execute the requested tasks based on one or more performance capabilities of the computer vision or learning algorithms, perform the computer vision or learning tasks for the computer applications using the selected algorithms, and expose the results of performing the computer vision or learning tasks for use by the computer applications.

  • Pub Date: 2015/09/09
  • Number: 09466013
  • Owner: SRI INTERNATIONAL
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Printed tag real-time tracking

Disclosed are various embodiments for flexible, low-cost tracking devices capable of seamless indoor and outdoor tracking transitions. A tracking device may comprise, for example, circuitry combined with one or more transceivers on a flexible substrate. At least a portion of the circuitry may be printed using a conductive medium, such as nanoparticle ink. The tracking device may be configured to localize the tracking device via GPS or an alternative localization strategy based on a determination of whether GPS communication is available.

  • Pub Date: 2015/08/09
  • Number: 09473902
  • Owner: KING ABDULLAH UNIVERSITY OF SCIENCE AND TECHNOLOGY
  • Location: Thuwal, SA
  • Details: Visit USPTO

Visit USPTO Page


Pluggable allocation in a cloud computing system

In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed. One or more of the plugin interfaces can be used to alter the allocation of virtual to physical resources across multiple services. Compound services and smart allocation facilities are possible with user-directed modification.

  • Pub Date: 2015/08/09
  • Number: 09584439
  • Owner: Rackspace US, Inc.
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Plasmon-assisted optical vias for photonic ASICS

The present invention relates to optical vias to optically connect multilevel optical circuits. In one example, the optical via includes a surface plasmon polariton waveguide, and a first optical waveguide formed on a first substrate is coupled to a second optical waveguide formed on a second substrate by the surface plasmon polariton waveguide. In some embodiments, the first optical waveguide includes a transition region configured to convert light from an optical mode to a surface plasmon polariton mode or from a surface plasmon polariton mode to an optical mode.

  • Pub Date: 2015/08/09
  • Number: 09599781
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Persistent content in nonvolatile memory

Applications may request persistent storage in nonvolatile memory. The persistent storage is maintained across power events and application instantiations. Persistent storage may be maintained by systems with or without memory management units.

  • Pub Date: 2015/08/09
  • Number: 09563554
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Networked system of intelligent lighting devices with sharing of processing resources of the devices with other entities

A system of network-connected lighting devices also offers a distributed processing function that utilizes processor and/or memory resources if/when available in some or all of the lighting devices. In the examples, a resource manager receives a job for distributed processing using shared available resources. The resource manager identifies lighting devices having resources of the processors and/or the memories available for the distributed processing function. The resource manager distributes tasks and/or data of the received job through a communications network to identified lighting devices, for distributed processing. The resource manager also receives results of distributed processing for the received job, from the identified lighting devices through the communications network. The received results are processed to produce a composite result for a response to the received job.

  • Pub Date: 2015/08/09
  • Number: 09538617
  • Owner: ABL IP HOLDING LLC
  • Location: Conyers, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining recommended aspects of future content, actions, or behavior

A method includes providing, by a processor of a computing device, potential requests. Each of the potential requests include an indication of at least one recommended aspect type for a future content. The method further includes receiving a selection of at least one of the potential requests for the at least one recommended aspect type for the future content. The selection is associated with a unique author in at least one social network, website, application software, or mobile application software (app). The method further includes automatically determining, in response to the selection, the recommended aspect for the future content. The recommended aspect is determined at least in part based on activity data that indicates aspects of other content authored by or interacted with by a plurality of authors in the at least one social network, website, application software, or mobile application software (app) prior to receipt of the selection.

  • Pub Date: 2015/07/09
  • Number: 09396483
  • Details: Visit USPTO

Visit USPTO Page


Fantasy sports integration with video content

Fantasy sports information may be integrated with video content of games or sporting events. An example technique includes determining one or more athletes on a roster of a fantasy sports team of a user, receiving video content of a game or sporting event, and identifying at least one athlete of interest that is on the roster of the fantasy sports team of the user depicted in the video content of the game or sporting event. The video content may then be displayed along with a visual indicator associated with the at least one athlete of interest to indicate that the athlete of interest is on the roster of the fantasy sports team of the user. The visual indicator may comprise a name, symbol, logo or other identifier of an entity, such as a sponsor of the game or sporting event.

  • Pub Date: 2015/07/09
  • Number: 09440152
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for contextualized data protection

Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. This concept is also referred to herein as Just-In-Time-Identity, or “JITI.” Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security—thereby facilitating the availability of more qualified information—via the use of temporally unique, dynamically changing de-identifiers (“DDIDs”). In some embodiments, specialized JITI keys may be used to “unlock” different views of the same DDID (or its underlying value), thereby providing granular control over the level of detail or obfuscation visible to each user based on the context of said user's authorized use of data, e.g., authorized purpose(s), place(s), time(s), or other attributes of the use.

  • Pub Date: 2015/04/09
  • Number: 09361481
  • Owner: Anonos Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing cache consistent regional clusters

When multiple regional data clusters are used to store data in a system, maintaining cache consistency across different regions is important for providing a desirable user experience. In one embodiment, there is a master data cluster where all data writes are performed, and the writes are replicated to each of the slave data clusters in the other regions. Appended to the replication statements are invalidations for cache values for the keys whose values have been changed in the master data cluster. An apparatus in the master data cluster logs replication statements sent to the slave databases. When a slave database fails, the apparatus extracts the invalidations intended for the failed database and publishes the invalidations to a subscriber in the region of the failed database. The subscriber sends the invalidations to the local caches to cause stale data for those keys to be deleted from the caches.

  • Pub Date: 2015/04/09
  • Number: 09477598
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for delivering departure notifications

The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions.

  • Pub Date: 2015/04/09
  • Number: 09644982
  • Owner: PELMOREX CANADA INC.
  • Location: Oakville, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for performing a handover in a wireless broadband network

A method and system for performing a handover in a wireless broadband network is disclosed. The method comprises receiving, measurement reports from one or more User Equipment (UE) associated with a serving base station (BS); determining occurrence of one or more handover event types based on the one or more measurement reports; counting a number of occurrences of each of the one or more handover event types within a predefined period; determining a consistency count for each of the one or more handover event types based on the number of occurrences of the one or more handover event types; and performing a handover based on a comparison between the consistency count for each of the one or more handover event types and associated threshold consistency counts for the one or more handover event types.

  • Pub Date: 2015/04/09
  • Number: 09510258
  • Owner: Wipro Limited
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Method and system for electronic content storage and retrieval using Galois fields and geometric shapes on cloud computing networks

A method and system for electronic content storage and retrieval using Galois Fields and geometric shapes on cloud computing networks. Plaintext electronic content is divided into plural portions and stored in plural cloud storage objects based on a created Xdimensional geometric shape and a path through selected components of the geometric shape. Storage locations for the plural cloud storage objects are selected using a Galois field and the geometric shape. The plural cloud storage objects are distributed across the cloud network. When the electronic content is requested, the plural portions are retrieved and transparently combined back into the original electronic content. No server network devices storing the plural cloud storage objects or target network devices requesting the stored electronic can individually determine locations of all portions of the stored electronic content on the cloud communications network, thereby providing various levels of security and privacy for the electronic content without having to encrypt the plaintext electronic content on the cloud network.

  • Pub Date: 2015/04/09
  • Number: 09361479
  • Details: Visit USPTO

Visit USPTO Page


Loudspeaker with laminate panel for mobile computing platforms

Systems and methods enhancing loudspeaker audio performance in thin devices, such as mobile computing platforms and/or communication handsets. In some embodiments, a laminate panel including a dielectric membrane and one or more conductive traces forming an inductive loop suitable wireless charging and/or near field communication (NFC) element is employed as a loudspeaker driven at audio frequencies. In some embodiments, the laminate panel is driven with one or more piezoelectric element. In some embodiments, the laminate panel is of a stiffness and mass to provide a frequency response distinct from that of integrated micro-speakers for a 2.1 audio solution with wider bandwidth than is possible with micro-speakers employing back-side cavities. In some embodiments, the frequency spectrum spanned by the laminate panel loudspeaker enables a tweeter design lacking back-side cavities for smaller device form factor. In some ultra-small form factors, micro-speakers may be eliminated from the platform with the laminate panel providing the only loudspeaker diaphragm for the mobile platform.

  • Pub Date: 2015/04/09
  • Number: 09553960
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Application security testing

The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.

  • Pub Date: 2015/04/09
  • Number: 09501650
  • Owner: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual reality system including social graph

The disclosure includes a system and method for receiving viewing data that describes a location of a first user's gaze while viewing virtual reality content. The method also determining an object of interest in the virtual reality content based on the location of the first user's gaze. The method also includes generating a social network that includes the first user as a member of the social network. The method also includes performing an action in the social network related to the object of interest.

  • Pub Date: 2015/03/09
  • Number: 09363569
  • Details: Visit USPTO

Visit USPTO Page


Similarity search and malware prioritization

Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information from the two or more malware samples. The extracted information is converted to a plurality of sets of strings. A similarity between the two or more malware samples is determined based on the plurality of the sets of strings.

  • Pub Date: 2015/02/09
  • Number: 09525702
  • Owner: Cyberpoint International LLC
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Sensing circuit for resistive memory cells

A sensing system may include a sense amplifier, a sensing circuit configured to sense a current difference, a data cell selectively coupled to the sensing circuit, a first reference cell selectively coupled to the sensing circuit, and a second reference cell selectively coupled to the sensing circuit. The resistance of the first reference cell and the second reference cell are different.

  • Pub Date: 2015/02/09
  • Number: 09502091
  • Owner: Industry-Academic Cooperation Foundation, Yonsei University
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Modeling of time-variant grain moisture content for determination of preferred temporal harvest windows and estimation of income loss from harvesting an overly-dry crop

A modeling framework for evaluating the impact of weather conditions on farming and harvest operations applies real-time, field-level weather data and forecasts of meteorological and climatological conditions together with user-provided and/or observed feedback of a present state of a harvest-related condition to agronomic models and to generate a plurality of harvest advisory outputs for precision agriculture. A harvest advisory model simulates and predicts the impacts of this weather information and user-provided and/or observed feedback in one or more physical, empirical, or artificial intelligence models of precision agriculture to analyze crops, plants, soils, and resulting agricultural commodities, and provides harvest advisory outputs to a diagnostic support tool for users to enhance farming and harvest decision-making, whether by providing pre-, post-, or in situ-harvest operations and crop analysis.

  • Pub Date: 2015/02/09
  • Number: 09311605
  • Owner: ITERIS, INC.
  • Location: Santa Ana, US
  • Details: Visit USPTO

Visit USPTO Page


Modeling of re-moistening of stored grain crop for acceptable time-of-sale moisture level and opportunity windows for operation of storage bin fans based on expected atmospheric conditions

A modeling framework for evaluating the impact of weather conditions on farming and harvest operations applies real-time, field-level weather data and forecasts of meteorological and climatological conditions together with user-provided and/or observed feedback of a present state of a harvest-related condition to agronomic models and to generate a plurality of harvest advisory outputs for precision agriculture. A harvest advisory model simulates and predicts the impacts of this weather information and user-provided and/or observed feedback in one or more physical, empirical, or artificial intelligence models of precision agriculture to analyze crops, plants, soils, and resulting agricultural commodities, and provides harvest advisory outputs to a diagnostic support tool for users to enhance farming and harvest decision-making, whether by providing pre-, post-, or in situ-harvest operations and crop analyses.

  • Pub Date: 2015/02/09
  • Number: 09336492
  • Owner: Iteris, Inc.
  • Location: Santa Ana, US
  • Details: Visit USPTO

Visit USPTO Page


Differential processing of data streams based on protocols

This disclosure relates to the processing of data streams. More specifically, application of particular protocols to a stream and a detection analysis facilitate a selective, reliable and efficient transmission of pertinent stream data to destination addresses.

  • Pub Date: 2015/02/09
  • Number: 09525606
  • Owner: HCA Holdings, Inc.
  • Location: Nashville, US
  • Details: Visit USPTO

Visit USPTO Page


Asset tracking system

Embodiments of the subject technology provide a multi-tenant asset tracking system that disambiguates or filters RFID tags.

  • Pub Date: 2015/02/09
  • Number: 09542581
  • Details: Visit USPTO

Visit USPTO Page


Assessment of moisture content of stored crop, and modeling usage of in-bin drying to control moisture level based on anticipated atmospheric conditions and forecast time periods of energy usage to achieve desired rate of grain moisture change through forced-air ventilation

A modeling framework for evaluating the impact of weather conditions on farming and harvest operations applies real-time, field-level weather data and forecasts of meteorological and climatological conditions together with user-provided and/or observed feedback of a present state of a harvest-related condition to agronomic models and to generate a plurality of harvest advisory outputs for precision agriculture. A harvest advisory model simulates and predicts the impacts of this weather information and user-provided and/or observed feedback in one or more physical, empirical, or artificial intelligence models of precision agriculture to analyze crops, plants, soils, and resulting agricultural commodities, and provides harvest advisory outputs to a diagnostic support tool for users to enhance farming and harvest decision-making, whether by providing pre-, post-, or in situ-harvest operations and crop analyses.

  • Pub Date: 2015/02/09
  • Number: 09518753
  • Owner: ITERIS, INC.
  • Location: Santa Ana, US
  • Details: Visit USPTO

Visit USPTO Page


Accelerating codeset conversion in a computing environment

A method for accelerating codeset conversion in a computing environment is provided. The method may include, among other things, receiving one or more requests for codeset conversion. The one or more requests may be received, for example, from a client over a communications network. A change in the one or more requests for codeset conversion may be detected. In response to detecting the change, a subset of codeset converters may be selected from among a library of codeset converters to be included in a codeset conversion accelerator. The codeset conversion accelerator may be, among other things, reprogrammed with selected subset of codeset converters. The one or more received requests may be subsequently rerouted to the reprogrammed codeset conversion accelerator.

  • Pub Date: 2015/02/09
  • Number: 09438269
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Text detection using features associated with neighboring glyph pairs

A multi-orientation text detection method and associated system is disclosed that utilizes orientation-variant glyph features to determine a text line in an image regardless of an orientation of the text line. Glyph features are determined for each glyph in an image with respect to a neighboring glyph. The glyph features are provided to a learned classifier that outputs a glyph pair score for each neighboring glyph pair. Each glyph pair score indicates a likelihood that the corresponding pair of neighboring glyphs form part of a same text line. The glyph pair scores are used to identify candidate text lines, which are then ranked to select a final set of text lines in the image.

  • Pub Date: 2015/01/09
  • Number: 09367736
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for dynamic protection from electronic attacks

Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.

  • Pub Date: 2015/01/09
  • Number: 09553888
  • Owner: NORSE NETWORKS, INC.
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing photoverification to mobile device charging stations

Systems and methods for locating and providing public mobile device charging stations are disclosed. One or more charging stations may be configured to charge a battery of a mobile device. A database may be configured to store location information of the one or more charging stations as well as mobile device location and security credential information of the one or more respective mobile devices. A server communicatively coupled with the one or more charging stations and the database, may be configured to determine a proximity of the one or more charging stations to a location of the mobile device. This determination may be based on the station location information and the mobile device location information. Based on the determined proximity, provide the station location information of the respective one or more charging stations to the mobile device. The charging station further provides photo and/or video surveillance security to verify a user.

  • Pub Date: 2015/01/09
  • Number: 09565565
  • Details: Visit USPTO

Visit USPTO Page


Sports scorekeeping system with integrated scoreboard and automatic entertainment system

An on-demand sports video streaming service generates live broadcasts of sporting events with an automated video capture system. Multiple cameras automatically which track game play are controlled to create a combined output. Game event data, including scoreboard information, audible queues or visual queues are implemented to assist in directing and controlling video content and to provide scoring, timing or player information into the video output.

  • Pub Date: 2015/01/09
  • Number: 09555310
  • Owner: Maxx Holdings, Inc.
  • Location: Toronto, Ontario, unknown
  • Details: Visit USPTO

Visit USPTO Page


Image forming apparatus, image processing system, and method

An image forming apparatus includes an acquiring unit, a determining unit, and a notifying unit. The acquiring unit acquires print data from an external apparatus via a network. The print data is generated by the external apparatus from document data received from a client apparatus. The determining unit determines whether or not the acquired print data is a dummy job or an actual job. The notifying unit notifies failure information when print data of the actual job is not acquired within a period after print data which is determined to be the dummy job is acquired. The failure information indicates a failure occurring in the process in which the external apparatus receives the document data from the client apparatus, or in the process in which the print data is generated from the document data in the external apparatus. The period satisfies a predetermined condition.

  • Pub Date: 2015/01/09
  • Number: 09569147
  • Owner: FUJI XEROX CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Combination therapy for MDS

Disclosed are compositions and methods for the treatment of disorders such as myelodysplastic syndrome (MDS) and acute myeloid leukemia (AML). The disclosed methods include administering to an individual in need of such treatment a composition that may include an IRAK1/4 inhibitor. In other aspects, the method may include administration of a BLC2 inhibitor.

  • Pub Date: 2015/01/09
  • Number: 09504706
  • Owner: Children's Hospital Medical Center
  • Location: Cincinnati, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless shared resource computing

The formation of a wireless device group for use in a computing environment involves establishing a wireless communication connection between a host wireless interface device and each of one or more dependent wireless interface devices, in which each dependent wireless interface device is configured to not directly communicate with a computing device. Another wireless communication connection is established between the host wireless interface device and the computing device when the host wireless interface device is within a host connection distance of the computing device. A further wireless communication connection can be established between the host wireless interface device and a second, different computing device.

  • Pub Date: 2015/31/08
  • Number: 09621687
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Video analytics configuration

An apparatus is disclosed which is operative to analyze a sequence of video frames of a camera view field to track an object in the view field and determine start and end points of the track in the view field. The apparatus also determines a start and end time for the track corresponding to the start and end points respectively; and stores the start and end points and the start and end times as attributes of the track.

  • Pub Date: 2015/31/08
  • Number: 09363489
  • Owner: Ipsotek Ltd.
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for interaction-based analysis and visualization of remote collaboration sessions

Systems and methods of performing a process are provided, including receiving a live document video stream of a remote collaboration session, detecting a cursor action in the live document video stream, classifying the detected cursor action into an action category, detecting key frames of the live document video stream, indexing the detected key frames based on the action category, detecting a keyword in the indexed key frames, indexing the key frames using the category, visualizing the cursor action in the key frames based on the action category, and displaying the visualized cursor action.

  • Pub Date: 2015/31/08
  • Number: 09646655
  • Owner: FUJI XEROX CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


System and method for unified synchronization of relationship connections across multiple social network databases

A system and method for unified synchronization of relationship connections across multiple social network databases is disclosed. In one aspect, the method includes logging in a first user to a first user account through a first wireless mobile device controlled by the first user, wherein the first user account comprises a logical connection to a plurality of the first user's social network accounts. The method further includes discovering a second wireless mobile device or account associated with a second user. The method further includes selecting more than one of the first user's social network accounts via input from the first user, and generating an invitation to connect to the second user's account, wherein the invitation comprises a connection invitation for the second user to connect to at least one of the selected social network accounts of the first user.

  • Pub Date: 2015/31/08
  • Number: 09307380
  • Owner: DGS Development, LLC
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy bypass login for applications on mobile devices

In one embodiment, an intermediate server receives a request with a secure ID to authorize a software application, transmits the secure ID to a system, receives an access token from the system indicating that the software application has been authorized, evaluates the access token for validity, and transmits a response to the mobile device indicating the software application is authorized.

  • Pub Date: 2015/31/08
  • Number: 09578011
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Managing applications on an electronic device

An electronic device may offload an application to a network storage to free up storage on the electronic device. For instance, an application file and, in some cases, associated application data and/or saved application state information may be stored at the network storage and deleted from the electronic device. Subsequently, a data management module may receive an instruction to onload the application back onto the electronic device, such as in response to a user input that selects the offloaded application, a determination that an upcoming activity may include use of the offloaded application, or a determination that a user usage pattern indicates that the offloaded application is likely to be used. In response, the data management module may download the corresponding application file from the network storage. In some cases, the electronic device may also receive associated application data and/or saved application state information from the network storage.

  • Pub Date: 2015/31/08
  • Number: 09654556
  • Owner: RAZER (ASIA-PACIFIC) PTE. LTD.
  • Location: Singapore, SG
  • Details: Visit USPTO